Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-db/mysql-connector-c@5.7.34
Typeebuild
Namespacedev-db
Namemysql-connector-c
Version5.7.34
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.0.24
Latest_non_vulnerable_version8.0.24
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-11tt-44je-dfg8
vulnerability_id VCID-11tt-44je-dfg8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14775
reference_id
reference_type
scores
0
value 0.01438
scoring_system epss
scoring_elements 0.80644
published_at 2026-04-01T12:55:00Z
1
value 0.01438
scoring_system epss
scoring_elements 0.80652
published_at 2026-04-02T12:55:00Z
2
value 0.01438
scoring_system epss
scoring_elements 0.80741
published_at 2026-04-21T12:55:00Z
3
value 0.01438
scoring_system epss
scoring_elements 0.80674
published_at 2026-04-04T12:55:00Z
4
value 0.01438
scoring_system epss
scoring_elements 0.8067
published_at 2026-04-07T12:55:00Z
5
value 0.01438
scoring_system epss
scoring_elements 0.80698
published_at 2026-04-08T12:55:00Z
6
value 0.01438
scoring_system epss
scoring_elements 0.80708
published_at 2026-04-09T12:55:00Z
7
value 0.01438
scoring_system epss
scoring_elements 0.80724
published_at 2026-04-11T12:55:00Z
8
value 0.01438
scoring_system epss
scoring_elements 0.80711
published_at 2026-04-12T12:55:00Z
9
value 0.01438
scoring_system epss
scoring_elements 0.80703
published_at 2026-04-13T12:55:00Z
10
value 0.01438
scoring_system epss
scoring_elements 0.80737
published_at 2026-04-16T12:55:00Z
11
value 0.01438
scoring_system epss
scoring_elements 0.80738
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14775
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890784
reference_id 1890784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890784
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14775
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-11tt-44je-dfg8
1
url VCID-12pp-8xvj-4qc5
vulnerability_id VCID-12pp-8xvj-4qc5
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14643.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14643
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56615
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56711
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56734
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56732
published_at 2026-04-04T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.5671
published_at 2026-04-07T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56762
published_at 2026-04-16T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56767
published_at 2026-04-09T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56775
published_at 2026-04-11T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56753
published_at 2026-04-12T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56731
published_at 2026-04-13T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.5676
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14643
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865969
reference_id 1865969
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865969
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:39Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:39Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14643
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12pp-8xvj-4qc5
2
url VCID-16hf-q2fp-3yg4
vulnerability_id VCID-16hf-q2fp-3yg4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2974.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2974.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2974
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43162
published_at 2026-04-21T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.43116
published_at 2026-04-01T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43174
published_at 2026-04-02T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43202
published_at 2026-04-04T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.4314
published_at 2026-04-07T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43192
published_at 2026-04-12T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43204
published_at 2026-04-09T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43225
published_at 2026-04-11T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43177
published_at 2026-04-13T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43237
published_at 2026-04-16T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43226
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2974
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
7
reference_url https://security.netapp.com/advisory/ntap-20191017-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://security.netapp.com/advisory/ntap-20191017-0002/
8
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764691
reference_id 1764691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764691
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2974
reference_id CVE-2019-2974
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2974
21
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://security.gentoo.org/glsa/202105-27
22
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
28
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
29
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
30
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
31
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
32
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
33
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
34
reference_url https://usn.ubuntu.com/4195-1/
reference_id USN-4195-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://usn.ubuntu.com/4195-1/
35
reference_url https://usn.ubuntu.com/4195-2/
reference_id USN-4195-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/
url https://usn.ubuntu.com/4195-2/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2019-2974
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16hf-q2fp-3yg4
3
url VCID-187q-sxxu-zyh5
vulnerability_id VCID-187q-sxxu-zyh5
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14836
reference_id
reference_type
scores
0
value 0.00637
scoring_system epss
scoring_elements 0.7041
published_at 2026-04-01T12:55:00Z
1
value 0.00637
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-02T12:55:00Z
2
value 0.00637
scoring_system epss
scoring_elements 0.70505
published_at 2026-04-21T12:55:00Z
3
value 0.00637
scoring_system epss
scoring_elements 0.7048
published_at 2026-04-09T12:55:00Z
4
value 0.00637
scoring_system epss
scoring_elements 0.70504
published_at 2026-04-11T12:55:00Z
5
value 0.00637
scoring_system epss
scoring_elements 0.70489
published_at 2026-04-12T12:55:00Z
6
value 0.00637
scoring_system epss
scoring_elements 0.70475
published_at 2026-04-13T12:55:00Z
7
value 0.00637
scoring_system epss
scoring_elements 0.70517
published_at 2026-04-16T12:55:00Z
8
value 0.00637
scoring_system epss
scoring_elements 0.70525
published_at 2026-04-18T12:55:00Z
9
value 0.00637
scoring_system epss
scoring_elements 0.70441
published_at 2026-04-04T12:55:00Z
10
value 0.00637
scoring_system epss
scoring_elements 0.70419
published_at 2026-04-07T12:55:00Z
11
value 0.00637
scoring_system epss
scoring_elements 0.70465
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14836
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890763
reference_id 1890763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890763
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:40Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14836
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-187q-sxxu-zyh5
4
url VCID-1vkz-z2pq-nbat
vulnerability_id VCID-1vkz-z2pq-nbat
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14861
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14861
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890773
reference_id 1890773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890773
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:15Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14861
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vkz-z2pq-nbat
5
url VCID-1vm5-s57q-5fh7
vulnerability_id VCID-1vm5-s57q-5fh7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14800
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.5534
published_at 2026-04-01T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55452
published_at 2026-04-02T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55498
published_at 2026-04-21T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55507
published_at 2026-04-09T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55516
published_at 2026-04-11T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55495
published_at 2026-04-12T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55479
published_at 2026-04-13T12:55:00Z
7
value 0.00324
scoring_system epss
scoring_elements 0.55515
published_at 2026-04-16T12:55:00Z
8
value 0.00324
scoring_system epss
scoring_elements 0.55519
published_at 2026-04-18T12:55:00Z
9
value 0.00324
scoring_system epss
scoring_elements 0.55476
published_at 2026-04-04T12:55:00Z
10
value 0.00324
scoring_system epss
scoring_elements 0.55454
published_at 2026-04-07T12:55:00Z
11
value 0.00324
scoring_system epss
scoring_elements 0.55506
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14800
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890753
reference_id 1890753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890753
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:14Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14800
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vm5-s57q-5fh7
6
url VCID-26c7-8j5m-pygt
vulnerability_id VCID-26c7-8j5m-pygt
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14804
reference_id
reference_type
scores
0
value 0.00372
scoring_system epss
scoring_elements 0.58885
published_at 2026-04-01T12:55:00Z
1
value 0.00372
scoring_system epss
scoring_elements 0.5896
published_at 2026-04-02T12:55:00Z
2
value 0.00372
scoring_system epss
scoring_elements 0.59027
published_at 2026-04-18T12:55:00Z
3
value 0.00372
scoring_system epss
scoring_elements 0.59
published_at 2026-04-08T12:55:00Z
4
value 0.00372
scoring_system epss
scoring_elements 0.59006
published_at 2026-04-09T12:55:00Z
5
value 0.00372
scoring_system epss
scoring_elements 0.59026
published_at 2026-04-11T12:55:00Z
6
value 0.00372
scoring_system epss
scoring_elements 0.59007
published_at 2026-04-21T12:55:00Z
7
value 0.00372
scoring_system epss
scoring_elements 0.58989
published_at 2026-04-13T12:55:00Z
8
value 0.00372
scoring_system epss
scoring_elements 0.59023
published_at 2026-04-16T12:55:00Z
9
value 0.00372
scoring_system epss
scoring_elements 0.58982
published_at 2026-04-04T12:55:00Z
10
value 0.00372
scoring_system epss
scoring_elements 0.58948
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14804
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890754
reference_id 1890754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890754
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:09Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14804
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26c7-8j5m-pygt
7
url VCID-28f6-ud4w-aug9
vulnerability_id VCID-28f6-ud4w-aug9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2934.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2934.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2934
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36828
published_at 2026-04-01T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36891
published_at 2026-04-18T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36908
published_at 2026-04-16T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36862
published_at 2026-04-13T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36985
published_at 2026-04-02T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36887
published_at 2026-04-12T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36922
published_at 2026-04-11T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36914
published_at 2026-04-09T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36899
published_at 2026-04-08T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.37019
published_at 2026-04-04T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36848
published_at 2026-04-07T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37354
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2934
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
9
reference_url https://www.debian.org/security/2020/dsa-4703
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://www.debian.org/security/2020/dsa-4703
10
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
11
reference_url https://www.oracle.com/security-alerts/cpujan2022.html
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://www.oracle.com/security-alerts/cpujan2022.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851014
reference_id 1851014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851014
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2934
reference_id CVE-2020-2934
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value 5.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2934
23
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/
url https://security.gentoo.org/glsa/202105-27
24
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
25
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
26
reference_url https://access.redhat.com/errata/RHSA-2021:5134
reference_id RHSA-2021:5134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5134
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2934
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28f6-ud4w-aug9
8
url VCID-28fq-18k1-5ycd
vulnerability_id VCID-28fq-18k1-5ycd
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2627.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2627.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2627
reference_id
reference_type
scores
0
value 0.00418
scoring_system epss
scoring_elements 0.61839
published_at 2026-04-21T12:55:00Z
1
value 0.00441
scoring_system epss
scoring_elements 0.63117
published_at 2026-04-01T12:55:00Z
2
value 0.00441
scoring_system epss
scoring_elements 0.63172
published_at 2026-04-07T12:55:00Z
3
value 0.00441
scoring_system epss
scoring_elements 0.63224
published_at 2026-04-08T12:55:00Z
4
value 0.00441
scoring_system epss
scoring_elements 0.63242
published_at 2026-04-09T12:55:00Z
5
value 0.00441
scoring_system epss
scoring_elements 0.63259
published_at 2026-04-11T12:55:00Z
6
value 0.00441
scoring_system epss
scoring_elements 0.63244
published_at 2026-04-12T12:55:00Z
7
value 0.00441
scoring_system epss
scoring_elements 0.63243
published_at 2026-04-16T12:55:00Z
8
value 0.00441
scoring_system epss
scoring_elements 0.63251
published_at 2026-04-18T12:55:00Z
9
value 0.00441
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-02T12:55:00Z
10
value 0.00441
scoring_system epss
scoring_elements 0.63207
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2627
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796905
reference_id 1796905
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796905
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:03:29Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:03:29Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2627
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28fq-18k1-5ycd
9
url VCID-29k9-yssc-jbec
vulnerability_id VCID-29k9-yssc-jbec
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2036
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2036
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922395
reference_id 1922395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922395
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2036
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29k9-yssc-jbec
10
url VCID-2eev-6ekm-2ydm
vulnerability_id VCID-2eev-6ekm-2ydm
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2760.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2760.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2760
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29485
published_at 2026-04-21T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29596
published_at 2026-04-08T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29662
published_at 2026-04-02T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29712
published_at 2026-04-04T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29533
published_at 2026-04-07T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29634
published_at 2026-04-09T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29636
published_at 2026-04-11T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29591
published_at 2026-04-12T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29539
published_at 2026-04-13T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29559
published_at 2026-04-16T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29532
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2760
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
8
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
9
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830082
reference_id 1830082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830082
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2760
reference_id CVE-2020-2760
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
2
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2760
27
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://security.gentoo.org/glsa/202012-08
28
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://security.gentoo.org/glsa/202105-27
29
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
30
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
31
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
32
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
33
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
34
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
35
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
36
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
37
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
38
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
39
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/
url https://usn.ubuntu.com/4350-1/
40
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2760
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2eev-6ekm-2ydm
11
url VCID-2fyj-vfka-g3fc
vulnerability_id VCID-2fyj-vfka-g3fc
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2046
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2046
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922398
reference_id 1922398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922398
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2046
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fyj-vfka-g3fc
12
url VCID-2hqz-t746-57bt
vulnerability_id VCID-2hqz-t746-57bt
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2060
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2060
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922402
reference_id 1922402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922402
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2060
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hqz-t746-57bt
13
url VCID-2sfw-7k8u-1fbk
vulnerability_id VCID-2sfw-7k8u-1fbk
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14827
reference_id
reference_type
scores
0
value 0.00455
scoring_system epss
scoring_elements 0.63748
published_at 2026-04-01T12:55:00Z
1
value 0.00455
scoring_system epss
scoring_elements 0.63809
published_at 2026-04-02T12:55:00Z
2
value 0.00455
scoring_system epss
scoring_elements 0.63872
published_at 2026-04-18T12:55:00Z
3
value 0.00455
scoring_system epss
scoring_elements 0.63863
published_at 2026-04-16T12:55:00Z
4
value 0.00455
scoring_system epss
scoring_elements 0.63827
published_at 2026-04-13T12:55:00Z
5
value 0.00455
scoring_system epss
scoring_elements 0.63844
published_at 2026-04-08T12:55:00Z
6
value 0.00455
scoring_system epss
scoring_elements 0.63861
published_at 2026-04-21T12:55:00Z
7
value 0.00455
scoring_system epss
scoring_elements 0.63875
published_at 2026-04-11T12:55:00Z
8
value 0.00455
scoring_system epss
scoring_elements 0.63835
published_at 2026-04-04T12:55:00Z
9
value 0.00455
scoring_system epss
scoring_elements 0.63793
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14827
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890759
reference_id 1890759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890759
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:50Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14827
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2sfw-7k8u-1fbk
14
url VCID-2wdv-fu9e-fkg9
vulnerability_id VCID-2wdv-fu9e-fkg9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14620.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14620
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58672
published_at 2026-04-01T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58755
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58798
published_at 2026-04-21T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58744
published_at 2026-04-07T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-08T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58803
published_at 2026-04-09T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58822
published_at 2026-04-11T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58804
published_at 2026-04-12T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-13T12:55:00Z
9
value 0.00369
scoring_system epss
scoring_elements 0.58816
published_at 2026-04-16T12:55:00Z
10
value 0.00369
scoring_system epss
scoring_elements 0.58821
published_at 2026-04-18T12:55:00Z
11
value 0.00369
scoring_system epss
scoring_elements 0.58777
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14620
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865961
reference_id 1865961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865961
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:07Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:07Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14620
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2wdv-fu9e-fkg9
15
url VCID-2xaj-kpub-pfdt
vulnerability_id VCID-2xaj-kpub-pfdt
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2759.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2759
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53285
published_at 2026-04-01T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.53392
published_at 2026-04-21T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53308
published_at 2026-04-02T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53334
published_at 2026-04-04T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53303
published_at 2026-04-07T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53356
published_at 2026-04-08T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.5335
published_at 2026-04-09T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53402
published_at 2026-04-11T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.53385
published_at 2026-04-12T12:55:00Z
9
value 0.003
scoring_system epss
scoring_elements 0.53369
published_at 2026-04-13T12:55:00Z
10
value 0.003
scoring_system epss
scoring_elements 0.53406
published_at 2026-04-16T12:55:00Z
11
value 0.003
scoring_system epss
scoring_elements 0.53412
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2759
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830048
reference_id 1830048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830048
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2759
reference_id CVE-2020-2759
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2759
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2759
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xaj-kpub-pfdt
16
url VCID-2ytu-hw3r-ffc8
vulnerability_id VCID-2ytu-hw3r-ffc8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14814
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14814
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890757
reference_id 1890757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890757
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:00Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14814
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytu-hw3r-ffc8
17
url VCID-2zv1-9c2g-fkdq
vulnerability_id VCID-2zv1-9c2g-fkdq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14893
reference_id
reference_type
scores
0
value 0.00292
scoring_system epss
scoring_elements 0.52483
published_at 2026-04-01T12:55:00Z
1
value 0.00292
scoring_system epss
scoring_elements 0.5253
published_at 2026-04-02T12:55:00Z
2
value 0.00292
scoring_system epss
scoring_elements 0.52635
published_at 2026-04-18T12:55:00Z
3
value 0.00292
scoring_system epss
scoring_elements 0.52575
published_at 2026-04-08T12:55:00Z
4
value 0.00292
scoring_system epss
scoring_elements 0.52569
published_at 2026-04-09T12:55:00Z
5
value 0.00292
scoring_system epss
scoring_elements 0.5262
published_at 2026-04-21T12:55:00Z
6
value 0.00292
scoring_system epss
scoring_elements 0.52603
published_at 2026-04-12T12:55:00Z
7
value 0.00292
scoring_system epss
scoring_elements 0.52588
published_at 2026-04-13T12:55:00Z
8
value 0.00292
scoring_system epss
scoring_elements 0.52628
published_at 2026-04-16T12:55:00Z
9
value 0.00292
scoring_system epss
scoring_elements 0.52556
published_at 2026-04-04T12:55:00Z
10
value 0.00292
scoring_system epss
scoring_elements 0.52523
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14893
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890783
reference_id 1890783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890783
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:50Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14893
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zv1-9c2g-fkdq
18
url VCID-3c45-ytz8-cudx
vulnerability_id VCID-3c45-ytz8-cudx
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14680.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14680.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14680
reference_id
reference_type
scores
0
value 0.00539
scoring_system epss
scoring_elements 0.67524
published_at 2026-04-01T12:55:00Z
1
value 0.00539
scoring_system epss
scoring_elements 0.6756
published_at 2026-04-07T12:55:00Z
2
value 0.00539
scoring_system epss
scoring_elements 0.67627
published_at 2026-04-21T12:55:00Z
3
value 0.00539
scoring_system epss
scoring_elements 0.67582
published_at 2026-04-04T12:55:00Z
4
value 0.00539
scoring_system epss
scoring_elements 0.67611
published_at 2026-04-08T12:55:00Z
5
value 0.00539
scoring_system epss
scoring_elements 0.67625
published_at 2026-04-09T12:55:00Z
6
value 0.00539
scoring_system epss
scoring_elements 0.67647
published_at 2026-04-11T12:55:00Z
7
value 0.00539
scoring_system epss
scoring_elements 0.67633
published_at 2026-04-12T12:55:00Z
8
value 0.00539
scoring_system epss
scoring_elements 0.67601
published_at 2026-04-13T12:55:00Z
9
value 0.00539
scoring_system epss
scoring_elements 0.67636
published_at 2026-04-16T12:55:00Z
10
value 0.00539
scoring_system epss
scoring_elements 0.67648
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14680
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865974
reference_id 1865974
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865974
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:07Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:07Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14680
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3c45-ytz8-cudx
19
url VCID-3f87-xwd6-uqf6
vulnerability_id VCID-3f87-xwd6-uqf6
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14553.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14553
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58119
published_at 2026-04-01T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58205
published_at 2026-04-02T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58241
published_at 2026-04-21T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58225
published_at 2026-04-04T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.582
published_at 2026-04-07T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58254
published_at 2026-04-08T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58259
published_at 2026-04-09T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58276
published_at 2026-04-11T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58252
published_at 2026-04-12T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58233
published_at 2026-04-13T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58264
published_at 2026-04-16T12:55:00Z
11
value 0.00361
scoring_system epss
scoring_elements 0.58267
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14553
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865950
reference_id 1865950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865950
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14553
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3f87-xwd6-uqf6
20
url VCID-3h99-b8mf-rkcr
vulnerability_id VCID-3h99-b8mf-rkcr
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2922.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2922
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43264
published_at 2026-04-01T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43311
published_at 2026-04-21T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.4332
published_at 2026-04-02T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43348
published_at 2026-04-04T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43286
published_at 2026-04-07T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43337
published_at 2026-04-08T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43352
published_at 2026-04-09T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43372
published_at 2026-04-11T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43341
published_at 2026-04-12T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43326
published_at 2026-04-13T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43387
published_at 2026-04-16T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43376
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2922
2
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
3
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1835850
reference_id 1835850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1835850
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2922
reference_id CVE-2020-2922
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
2
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2922
17
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://security.gentoo.org/glsa/202105-27
18
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3708
19
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
20
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
21
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
22
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
23
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
24
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
25
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
26
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
27
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
28
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
29
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
30
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
31
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2922
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3h99-b8mf-rkcr
21
url VCID-3k3d-296j-kycn
vulnerability_id VCID-3k3d-296j-kycn
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2055
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2055
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922400
reference_id 1922400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922400
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2055
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3k3d-296j-kycn
22
url VCID-3nu8-d5r3-6khh
vulnerability_id VCID-3nu8-d5r3-6khh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2579.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2579.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2579
reference_id
reference_type
scores
0
value 0.00469
scoring_system epss
scoring_elements 0.64456
published_at 2026-04-01T12:55:00Z
1
value 0.00469
scoring_system epss
scoring_elements 0.6451
published_at 2026-04-02T12:55:00Z
2
value 0.00469
scoring_system epss
scoring_elements 0.64537
published_at 2026-04-13T12:55:00Z
3
value 0.00469
scoring_system epss
scoring_elements 0.64565
published_at 2026-04-12T12:55:00Z
4
value 0.00469
scoring_system epss
scoring_elements 0.64577
published_at 2026-04-11T12:55:00Z
5
value 0.00469
scoring_system epss
scoring_elements 0.64562
published_at 2026-04-09T12:55:00Z
6
value 0.00469
scoring_system epss
scoring_elements 0.64546
published_at 2026-04-08T12:55:00Z
7
value 0.00469
scoring_system epss
scoring_elements 0.64539
published_at 2026-04-04T12:55:00Z
8
value 0.00469
scoring_system epss
scoring_elements 0.64497
published_at 2026-04-07T12:55:00Z
9
value 0.00725
scoring_system epss
scoring_elements 0.72607
published_at 2026-04-21T12:55:00Z
10
value 0.00764
scoring_system epss
scoring_elements 0.73465
published_at 2026-04-18T12:55:00Z
11
value 0.00764
scoring_system epss
scoring_elements 0.73457
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2579
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796881
reference_id 1796881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796881
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:00Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:00Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2579
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nu8-d5r3-6khh
23
url VCID-3pme-m9qz-gfd1
vulnerability_id VCID-3pme-m9qz-gfd1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2928.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2928
reference_id
reference_type
scores
0
value 0.0066
scoring_system epss
scoring_elements 0.7104
published_at 2026-04-01T12:55:00Z
1
value 0.0066
scoring_system epss
scoring_elements 0.71121
published_at 2026-04-21T12:55:00Z
2
value 0.0066
scoring_system epss
scoring_elements 0.7105
published_at 2026-04-02T12:55:00Z
3
value 0.0066
scoring_system epss
scoring_elements 0.71067
published_at 2026-04-04T12:55:00Z
4
value 0.0066
scoring_system epss
scoring_elements 0.71041
published_at 2026-04-07T12:55:00Z
5
value 0.0066
scoring_system epss
scoring_elements 0.71084
published_at 2026-04-08T12:55:00Z
6
value 0.0066
scoring_system epss
scoring_elements 0.71097
published_at 2026-04-09T12:55:00Z
7
value 0.0066
scoring_system epss
scoring_elements 0.7112
published_at 2026-04-11T12:55:00Z
8
value 0.0066
scoring_system epss
scoring_elements 0.71105
published_at 2026-04-12T12:55:00Z
9
value 0.0066
scoring_system epss
scoring_elements 0.71089
published_at 2026-04-13T12:55:00Z
10
value 0.0066
scoring_system epss
scoring_elements 0.71135
published_at 2026-04-16T12:55:00Z
11
value 0.0066
scoring_system epss
scoring_elements 0.71142
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2928
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830078
reference_id 1830078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830078
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2928
reference_id CVE-2020-2928
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2928
13
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/
url https://security.gentoo.org/glsa/202105-27
14
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
15
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
16
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
17
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
18
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2928
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3pme-m9qz-gfd1
24
url VCID-3v1d-x9yt-3fbb
vulnerability_id VCID-3v1d-x9yt-3fbb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2032
reference_id
reference_type
scores
0
value 0.00255
scoring_system epss
scoring_elements 0.48776
published_at 2026-04-01T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48815
published_at 2026-04-02T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.4885
published_at 2026-04-21T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48846
published_at 2026-04-09T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.48862
published_at 2026-04-11T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.48836
published_at 2026-04-12T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48844
published_at 2026-04-13T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.48894
published_at 2026-04-16T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.4889
published_at 2026-04-18T12:55:00Z
9
value 0.00255
scoring_system epss
scoring_elements 0.4884
published_at 2026-04-04T12:55:00Z
10
value 0.00255
scoring_system epss
scoring_elements 0.48795
published_at 2026-04-07T12:55:00Z
11
value 0.00255
scoring_system epss
scoring_elements 0.48849
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2032
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922394
reference_id 1922394
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922394
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2032
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3v1d-x9yt-3fbb
25
url VCID-454s-k7hc-r7au
vulnerability_id VCID-454s-k7hc-r7au
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2893.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2893
reference_id
reference_type
scores
0
value 0.00487
scoring_system epss
scoring_elements 0.65324
published_at 2026-04-01T12:55:00Z
1
value 0.00487
scoring_system epss
scoring_elements 0.65436
published_at 2026-04-21T12:55:00Z
2
value 0.00487
scoring_system epss
scoring_elements 0.65373
published_at 2026-04-02T12:55:00Z
3
value 0.00487
scoring_system epss
scoring_elements 0.65398
published_at 2026-04-04T12:55:00Z
4
value 0.00487
scoring_system epss
scoring_elements 0.65363
published_at 2026-04-07T12:55:00Z
5
value 0.00487
scoring_system epss
scoring_elements 0.65416
published_at 2026-04-08T12:55:00Z
6
value 0.00487
scoring_system epss
scoring_elements 0.65427
published_at 2026-04-09T12:55:00Z
7
value 0.00487
scoring_system epss
scoring_elements 0.65445
published_at 2026-04-11T12:55:00Z
8
value 0.00487
scoring_system epss
scoring_elements 0.65431
published_at 2026-04-12T12:55:00Z
9
value 0.00487
scoring_system epss
scoring_elements 0.65404
published_at 2026-04-13T12:55:00Z
10
value 0.00487
scoring_system epss
scoring_elements 0.6544
published_at 2026-04-16T12:55:00Z
11
value 0.00487
scoring_system epss
scoring_elements 0.65451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2893
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830064
reference_id 1830064
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830064
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2893
reference_id CVE-2020-2893
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2893
21
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/
url https://security.gentoo.org/glsa/202105-27
22
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
23
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
24
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
25
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
26
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2893
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-454s-k7hc-r7au
26
url VCID-45br-6r25-8ufz
vulnerability_id VCID-45br-6r25-8ufz
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14624.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14624
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58672
published_at 2026-04-01T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58755
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58798
published_at 2026-04-21T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58744
published_at 2026-04-07T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-08T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58803
published_at 2026-04-09T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58822
published_at 2026-04-11T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58804
published_at 2026-04-12T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-13T12:55:00Z
9
value 0.00369
scoring_system epss
scoring_elements 0.58816
published_at 2026-04-16T12:55:00Z
10
value 0.00369
scoring_system epss
scoring_elements 0.58821
published_at 2026-04-18T12:55:00Z
11
value 0.00369
scoring_system epss
scoring_elements 0.58777
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14624
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865963
reference_id 1865963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865963
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:03Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:03Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14624
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45br-6r25-8ufz
27
url VCID-4d42-nuh7-6bcu
vulnerability_id VCID-4d42-nuh7-6bcu
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2572.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2572.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2572
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53745
published_at 2026-04-21T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.5503
published_at 2026-04-01T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.5513
published_at 2026-04-07T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55179
published_at 2026-04-09T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55191
published_at 2026-04-11T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55172
published_at 2026-04-12T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55154
published_at 2026-04-13T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55193
published_at 2026-04-16T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55196
published_at 2026-04-18T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55131
published_at 2026-04-02T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55155
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2572
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796879
reference_id 1796879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796879
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:09Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:09Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2572
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4d42-nuh7-6bcu
28
url VCID-4fdf-ne4n-wyc2
vulnerability_id VCID-4fdf-ne4n-wyc2
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2048
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54405
published_at 2026-04-01T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54481
published_at 2026-04-02T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.5451
published_at 2026-04-21T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54519
published_at 2026-04-09T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54531
published_at 2026-04-11T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54513
published_at 2026-04-12T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54492
published_at 2026-04-13T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.5453
published_at 2026-04-16T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54532
published_at 2026-04-18T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54503
published_at 2026-04-04T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54472
published_at 2026-04-07T12:55:00Z
11
value 0.00314
scoring_system epss
scoring_elements 0.54525
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2048
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922399
reference_id 1922399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922399
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2048
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4fdf-ne4n-wyc2
29
url VCID-4msq-13an-d7cb
vulnerability_id VCID-4msq-13an-d7cb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14789
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76541
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76546
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-21T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76574
published_at 2026-04-04T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.76555
published_at 2026-04-07T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76587
published_at 2026-04-08T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-09T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-11T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76604
published_at 2026-04-12T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-13T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-16T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.7664
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890747
reference_id 1890747
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890747
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
11
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
12
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
13
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14789
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb
30
url VCID-4qvq-j6yh-ckbf
vulnerability_id VCID-4qvq-j6yh-ckbf
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14866
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14866
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890774
reference_id 1890774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890774
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:13Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14866
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-j6yh-ckbf
31
url VCID-4rzj-rkuh-ffg8
vulnerability_id VCID-4rzj-rkuh-ffg8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2921.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2921
reference_id
reference_type
scores
0
value 0.00258
scoring_system epss
scoring_elements 0.49099
published_at 2026-04-01T12:55:00Z
1
value 0.00258
scoring_system epss
scoring_elements 0.49175
published_at 2026-04-21T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49132
published_at 2026-04-02T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.49161
published_at 2026-04-13T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49113
published_at 2026-04-07T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49164
published_at 2026-04-09T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49182
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49155
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49207
published_at 2026-04-16T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49205
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2921
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830073
reference_id 1830073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830073
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2921
reference_id CVE-2020-2921
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2921
13
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/
url https://security.gentoo.org/glsa/202105-27
14
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
15
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
16
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
17
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
18
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2921
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4rzj-rkuh-ffg8
32
url VCID-4zfz-7zkz-e7hn
vulnerability_id VCID-4zfz-7zkz-e7hn
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2002
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34706
published_at 2026-04-01T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34914
published_at 2026-04-02T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34814
published_at 2026-04-21T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.3494
published_at 2026-04-04T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.3482
published_at 2026-04-07T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34864
published_at 2026-04-08T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34892
published_at 2026-04-09T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34896
published_at 2026-04-11T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34859
published_at 2026-04-18T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34836
published_at 2026-04-13T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34875
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2002
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922380
reference_id 1922380
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922380
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
10
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2002
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zfz-7zkz-e7hn
33
url VCID-5527-9ttk-4kgv
vulnerability_id VCID-5527-9ttk-4kgv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2588.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2588
reference_id
reference_type
scores
0
value 0.00394
scoring_system epss
scoring_elements 0.60359
published_at 2026-04-21T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61541
published_at 2026-04-01T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61664
published_at 2026-04-08T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61679
published_at 2026-04-09T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.617
published_at 2026-04-11T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61689
published_at 2026-04-12T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61669
published_at 2026-04-13T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61711
published_at 2026-04-16T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61716
published_at 2026-04-18T12:55:00Z
9
value 0.00415
scoring_system epss
scoring_elements 0.61615
published_at 2026-04-02T12:55:00Z
10
value 0.00415
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-04T12:55:00Z
11
value 0.00415
scoring_system epss
scoring_elements 0.61616
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2588
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796884
reference_id 1796884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796884
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:48Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:48Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2588
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5527-9ttk-4kgv
34
url VCID-5cah-ww3a-7kfv
vulnerability_id VCID-5cah-ww3a-7kfv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14641.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14641
reference_id
reference_type
scores
0
value 0.00446
scoring_system epss
scoring_elements 0.63365
published_at 2026-04-01T12:55:00Z
1
value 0.00446
scoring_system epss
scoring_elements 0.63425
published_at 2026-04-02T12:55:00Z
2
value 0.00446
scoring_system epss
scoring_elements 0.63479
published_at 2026-04-21T12:55:00Z
3
value 0.00446
scoring_system epss
scoring_elements 0.63452
published_at 2026-04-04T12:55:00Z
4
value 0.00446
scoring_system epss
scoring_elements 0.63417
published_at 2026-04-07T12:55:00Z
5
value 0.00446
scoring_system epss
scoring_elements 0.63468
published_at 2026-04-08T12:55:00Z
6
value 0.00446
scoring_system epss
scoring_elements 0.63486
published_at 2026-04-16T12:55:00Z
7
value 0.00446
scoring_system epss
scoring_elements 0.63503
published_at 2026-04-11T12:55:00Z
8
value 0.00446
scoring_system epss
scoring_elements 0.63487
published_at 2026-04-12T12:55:00Z
9
value 0.00446
scoring_system epss
scoring_elements 0.63453
published_at 2026-04-13T12:55:00Z
10
value 0.00446
scoring_system epss
scoring_elements 0.63494
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14641
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865968
reference_id 1865968
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865968
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:40Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:40Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14641
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cah-ww3a-7kfv
35
url VCID-5sgr-q6mn-u7gq
vulnerability_id VCID-5sgr-q6mn-u7gq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14776
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76541
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76546
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-21T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76574
published_at 2026-04-04T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.76555
published_at 2026-04-07T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76587
published_at 2026-04-08T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-09T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-11T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76604
published_at 2026-04-12T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-13T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-16T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.7664
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890743
reference_id 1890743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890743
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
11
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
12
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
13
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14776
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq
36
url VCID-5ug6-v7ru-j3bv
vulnerability_id VCID-5ug6-v7ru-j3bv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14790
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74705
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-07T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74783
published_at 2026-04-21T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.74735
published_at 2026-04-04T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74741
published_at 2026-04-08T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74756
published_at 2026-04-09T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74779
published_at 2026-04-11T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-12T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74749
published_at 2026-04-13T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74785
published_at 2026-04-16T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74793
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14790
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890748
reference_id 1890748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890748
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14790
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ug6-v7ru-j3bv
37
url VCID-66fe-xw3w-xbfh
vulnerability_id VCID-66fe-xw3w-xbfh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2001
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.58168
published_at 2026-04-01T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58253
published_at 2026-04-02T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58295
published_at 2026-04-21T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58274
published_at 2026-04-04T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-07T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58302
published_at 2026-04-08T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58308
published_at 2026-04-09T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58326
published_at 2026-04-11T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58304
published_at 2026-04-12T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58283
published_at 2026-04-13T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58316
published_at 2026-04-16T12:55:00Z
11
value 0.00362
scoring_system epss
scoring_elements 0.58318
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2001
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922379
reference_id 1922379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922379
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2001
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-66fe-xw3w-xbfh
38
url VCID-6dhz-zsur-mbdv
vulnerability_id VCID-6dhz-zsur-mbdv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14651.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14651.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14651
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56615
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56711
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56734
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56732
published_at 2026-04-04T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.5671
published_at 2026-04-07T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56762
published_at 2026-04-16T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56767
published_at 2026-04-09T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56775
published_at 2026-04-11T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56753
published_at 2026-04-12T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56731
published_at 2026-04-13T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.5676
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14651
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865982
reference_id 1865982
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865982
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:30Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:30Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14651
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhz-zsur-mbdv
39
url VCID-6du1-tzth-k3ht
vulnerability_id VCID-6du1-tzth-k3ht
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2812.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2812.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2812
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31334
published_at 2026-04-21T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31344
published_at 2026-04-01T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31483
published_at 2026-04-02T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31525
published_at 2026-04-04T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31343
published_at 2026-04-07T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31396
published_at 2026-04-08T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31427
published_at 2026-04-09T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.3143
published_at 2026-04-11T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31387
published_at 2026-04-12T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.3135
published_at 2026-04-13T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31383
published_at 2026-04-16T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31363
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2812
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
8
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
9
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830059
reference_id 1830059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830059
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2812
reference_id CVE-2020-2812
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2812
29
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://security.gentoo.org/glsa/202012-08
30
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://security.gentoo.org/glsa/202105-27
31
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
32
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
33
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
34
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
35
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
36
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
37
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
38
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
39
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
40
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
41
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
42
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/
url https://usn.ubuntu.com/4350-1/
43
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2812
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6du1-tzth-k3ht
40
url VCID-6gcu-yxck-x3ey
vulnerability_id VCID-6gcu-yxck-x3ey
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14614.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14614
reference_id
reference_type
scores
0
value 0.00436
scoring_system epss
scoring_elements 0.6291
published_at 2026-04-01T12:55:00Z
1
value 0.00436
scoring_system epss
scoring_elements 0.62968
published_at 2026-04-02T12:55:00Z
2
value 0.00436
scoring_system epss
scoring_elements 0.63032
published_at 2026-04-21T12:55:00Z
3
value 0.00436
scoring_system epss
scoring_elements 0.62997
published_at 2026-04-04T12:55:00Z
4
value 0.00436
scoring_system epss
scoring_elements 0.62961
published_at 2026-04-07T12:55:00Z
5
value 0.00436
scoring_system epss
scoring_elements 0.63012
published_at 2026-04-08T12:55:00Z
6
value 0.00436
scoring_system epss
scoring_elements 0.63028
published_at 2026-04-09T12:55:00Z
7
value 0.00436
scoring_system epss
scoring_elements 0.63046
published_at 2026-04-16T12:55:00Z
8
value 0.00436
scoring_system epss
scoring_elements 0.63031
published_at 2026-04-12T12:55:00Z
9
value 0.00436
scoring_system epss
scoring_elements 0.63009
published_at 2026-04-13T12:55:00Z
10
value 0.00436
scoring_system epss
scoring_elements 0.63053
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14614
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865959
reference_id 1865959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865959
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:14Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14614
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gcu-yxck-x3ey
41
url VCID-6grs-76qf-jqhf
vulnerability_id VCID-6grs-76qf-jqhf
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14785
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14785
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890745
reference_id 1890745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890745
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14785
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6grs-76qf-jqhf
42
url VCID-6msr-sgew-fuf8
vulnerability_id VCID-6msr-sgew-fuf8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2577.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2577.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2577
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47579
published_at 2026-04-21T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.48948
published_at 2026-04-01T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48964
published_at 2026-04-07T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.49018
published_at 2026-04-08T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.49014
published_at 2026-04-09T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.49031
published_at 2026-04-11T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.49004
published_at 2026-04-12T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.49055
published_at 2026-04-16T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49051
published_at 2026-04-18T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.48983
published_at 2026-04-02T12:55:00Z
10
value 0.00256
scoring_system epss
scoring_elements 0.4901
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2577
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796880
reference_id 1796880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796880
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:02Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:02Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2577
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6msr-sgew-fuf8
43
url VCID-6w26-6psj-zubm
vulnerability_id VCID-6w26-6psj-zubm
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14809
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14809
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890755
reference_id 1890755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890755
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:05Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14809
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6w26-6psj-zubm
44
url VCID-6ym4-jmxp-qbbg
vulnerability_id VCID-6ym4-jmxp-qbbg
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14559.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14559
reference_id
reference_type
scores
0
value 0.00647
scoring_system epss
scoring_elements 0.707
published_at 2026-04-01T12:55:00Z
1
value 0.00647
scoring_system epss
scoring_elements 0.70715
published_at 2026-04-02T12:55:00Z
2
value 0.00647
scoring_system epss
scoring_elements 0.70792
published_at 2026-04-21T12:55:00Z
3
value 0.00647
scoring_system epss
scoring_elements 0.70733
published_at 2026-04-04T12:55:00Z
4
value 0.00647
scoring_system epss
scoring_elements 0.7071
published_at 2026-04-07T12:55:00Z
5
value 0.00647
scoring_system epss
scoring_elements 0.70755
published_at 2026-04-08T12:55:00Z
6
value 0.00647
scoring_system epss
scoring_elements 0.70771
published_at 2026-04-09T12:55:00Z
7
value 0.00647
scoring_system epss
scoring_elements 0.70794
published_at 2026-04-11T12:55:00Z
8
value 0.00647
scoring_system epss
scoring_elements 0.70777
published_at 2026-04-12T12:55:00Z
9
value 0.00647
scoring_system epss
scoring_elements 0.70762
published_at 2026-04-13T12:55:00Z
10
value 0.00647
scoring_system epss
scoring_elements 0.70807
published_at 2026-04-16T12:55:00Z
11
value 0.00647
scoring_system epss
scoring_elements 0.70814
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14559
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865951
reference_id 1865951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865951
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14559
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ym4-jmxp-qbbg
45
url VCID-6z2t-rt9t-wydy
vulnerability_id VCID-6z2t-rt9t-wydy
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14828
reference_id
reference_type
scores
0
value 0.00942
scoring_system epss
scoring_elements 0.76219
published_at 2026-04-01T12:55:00Z
1
value 0.00942
scoring_system epss
scoring_elements 0.76223
published_at 2026-04-02T12:55:00Z
2
value 0.00942
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-21T12:55:00Z
3
value 0.00942
scoring_system epss
scoring_elements 0.7628
published_at 2026-04-09T12:55:00Z
4
value 0.00942
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-11T12:55:00Z
5
value 0.00942
scoring_system epss
scoring_elements 0.76284
published_at 2026-04-12T12:55:00Z
6
value 0.00942
scoring_system epss
scoring_elements 0.76279
published_at 2026-04-13T12:55:00Z
7
value 0.00942
scoring_system epss
scoring_elements 0.7632
published_at 2026-04-16T12:55:00Z
8
value 0.00942
scoring_system epss
scoring_elements 0.76325
published_at 2026-04-18T12:55:00Z
9
value 0.00942
scoring_system epss
scoring_elements 0.76254
published_at 2026-04-04T12:55:00Z
10
value 0.00942
scoring_system epss
scoring_elements 0.76234
published_at 2026-04-07T12:55:00Z
11
value 0.00942
scoring_system epss
scoring_elements 0.76266
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14828
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890760
reference_id 1890760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890760
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:02Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14828
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6z2t-rt9t-wydy
46
url VCID-71bd-rm5x-cud8
vulnerability_id VCID-71bd-rm5x-cud8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14848
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14848
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890770
reference_id 1890770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890770
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:27Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14848
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71bd-rm5x-cud8
47
url VCID-7gfu-mf9q-g3gx
vulnerability_id VCID-7gfu-mf9q-g3gx
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14576.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14576.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14576
reference_id
reference_type
scores
0
value 0.00658
scoring_system epss
scoring_elements 0.70987
published_at 2026-04-01T12:55:00Z
1
value 0.00658
scoring_system epss
scoring_elements 0.70997
published_at 2026-04-02T12:55:00Z
2
value 0.00658
scoring_system epss
scoring_elements 0.71071
published_at 2026-04-21T12:55:00Z
3
value 0.00658
scoring_system epss
scoring_elements 0.71015
published_at 2026-04-04T12:55:00Z
4
value 0.00658
scoring_system epss
scoring_elements 0.7099
published_at 2026-04-07T12:55:00Z
5
value 0.00658
scoring_system epss
scoring_elements 0.71032
published_at 2026-04-08T12:55:00Z
6
value 0.00658
scoring_system epss
scoring_elements 0.71047
published_at 2026-04-09T12:55:00Z
7
value 0.00658
scoring_system epss
scoring_elements 0.7107
published_at 2026-04-11T12:55:00Z
8
value 0.00658
scoring_system epss
scoring_elements 0.71055
published_at 2026-04-12T12:55:00Z
9
value 0.00658
scoring_system epss
scoring_elements 0.71037
published_at 2026-04-13T12:55:00Z
10
value 0.00658
scoring_system epss
scoring_elements 0.71084
published_at 2026-04-16T12:55:00Z
11
value 0.00658
scoring_system epss
scoring_elements 0.71091
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14576
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865955
reference_id 1865955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865955
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14576
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gfu-mf9q-g3gx
48
url VCID-7jj8-tenv-zub1
vulnerability_id VCID-7jj8-tenv-zub1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14837
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14837
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890764
reference_id 1890764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890764
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:39Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14837
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jj8-tenv-zub1
49
url VCID-7ruf-mz2x-6uaz
vulnerability_id VCID-7ruf-mz2x-6uaz
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2896.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2896.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2896
reference_id
reference_type
scores
0
value 0.00487
scoring_system epss
scoring_elements 0.65324
published_at 2026-04-01T12:55:00Z
1
value 0.00487
scoring_system epss
scoring_elements 0.65436
published_at 2026-04-21T12:55:00Z
2
value 0.00487
scoring_system epss
scoring_elements 0.65373
published_at 2026-04-02T12:55:00Z
3
value 0.00487
scoring_system epss
scoring_elements 0.65398
published_at 2026-04-04T12:55:00Z
4
value 0.00487
scoring_system epss
scoring_elements 0.65363
published_at 2026-04-07T12:55:00Z
5
value 0.00487
scoring_system epss
scoring_elements 0.65416
published_at 2026-04-08T12:55:00Z
6
value 0.00487
scoring_system epss
scoring_elements 0.65427
published_at 2026-04-09T12:55:00Z
7
value 0.00487
scoring_system epss
scoring_elements 0.65445
published_at 2026-04-11T12:55:00Z
8
value 0.00487
scoring_system epss
scoring_elements 0.65431
published_at 2026-04-12T12:55:00Z
9
value 0.00487
scoring_system epss
scoring_elements 0.65404
published_at 2026-04-13T12:55:00Z
10
value 0.00487
scoring_system epss
scoring_elements 0.6544
published_at 2026-04-16T12:55:00Z
11
value 0.00487
scoring_system epss
scoring_elements 0.65451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2896
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830067
reference_id 1830067
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830067
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2896
reference_id CVE-2020-2896
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2896
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2896
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ruf-mz2x-6uaz
50
url VCID-7zra-1j2r-sqhx
vulnerability_id VCID-7zra-1j2r-sqhx
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14654.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14654.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14654
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58672
published_at 2026-04-01T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58755
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58798
published_at 2026-04-21T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58744
published_at 2026-04-07T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-08T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58803
published_at 2026-04-09T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58822
published_at 2026-04-11T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58804
published_at 2026-04-12T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-13T12:55:00Z
9
value 0.00369
scoring_system epss
scoring_elements 0.58816
published_at 2026-04-16T12:55:00Z
10
value 0.00369
scoring_system epss
scoring_elements 0.58821
published_at 2026-04-18T12:55:00Z
11
value 0.00369
scoring_system epss
scoring_elements 0.58777
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14654
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865970
reference_id 1865970
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865970
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:27Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:27Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14654
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7zra-1j2r-sqhx
51
url VCID-8fx7-rydt-nydd
vulnerability_id VCID-8fx7-rydt-nydd
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2694.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2694
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.5498
published_at 2026-04-01T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55082
published_at 2026-04-07T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55127
published_at 2026-04-21T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55106
published_at 2026-04-13T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55132
published_at 2026-04-09T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55144
published_at 2026-04-16T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55124
published_at 2026-04-12T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55148
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2694
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796889
reference_id 1796889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796889
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:39Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:39Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2694
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fx7-rydt-nydd
52
url VCID-8h4m-83xa-m7df
vulnerability_id VCID-8h4m-83xa-m7df
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2021
reference_id
reference_type
scores
0
value 0.51799
scoring_system epss
scoring_elements 0.97882
published_at 2026-04-01T12:55:00Z
1
value 0.51799
scoring_system epss
scoring_elements 0.97887
published_at 2026-04-02T12:55:00Z
2
value 0.51799
scoring_system epss
scoring_elements 0.9791
published_at 2026-04-21T12:55:00Z
3
value 0.51799
scoring_system epss
scoring_elements 0.97888
published_at 2026-04-04T12:55:00Z
4
value 0.51799
scoring_system epss
scoring_elements 0.97891
published_at 2026-04-07T12:55:00Z
5
value 0.51799
scoring_system epss
scoring_elements 0.97895
published_at 2026-04-08T12:55:00Z
6
value 0.51799
scoring_system epss
scoring_elements 0.97898
published_at 2026-04-09T12:55:00Z
7
value 0.51799
scoring_system epss
scoring_elements 0.97901
published_at 2026-04-11T12:55:00Z
8
value 0.51799
scoring_system epss
scoring_elements 0.97902
published_at 2026-04-12T12:55:00Z
9
value 0.51799
scoring_system epss
scoring_elements 0.97903
published_at 2026-04-13T12:55:00Z
10
value 0.51799
scoring_system epss
scoring_elements 0.97911
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2021
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922388
reference_id 1922388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922388
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
10
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2021
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4m-83xa-m7df
53
url VCID-8hkm-7z6b-p7a3
vulnerability_id VCID-8hkm-7z6b-p7a3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14702.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14702.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14702
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.49963
published_at 2026-04-01T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.50001
published_at 2026-04-02T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.50033
published_at 2026-04-21T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49979
published_at 2026-04-07T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.50034
published_at 2026-04-08T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.50027
published_at 2026-04-09T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.50045
published_at 2026-04-11T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.50017
published_at 2026-04-12T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.50014
published_at 2026-04-13T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.50059
published_at 2026-04-16T12:55:00Z
10
value 0.00265
scoring_system epss
scoring_elements 0.50061
published_at 2026-04-18T12:55:00Z
11
value 0.00265
scoring_system epss
scoring_elements 0.50028
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14702
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865976
reference_id 1865976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865976
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:24Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:24Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14702
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8hkm-7z6b-p7a3
54
url VCID-8sng-6dfg-yfa9
vulnerability_id VCID-8sng-6dfg-yfa9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2580.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2580.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2580
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.60638
published_at 2026-04-21T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61858
published_at 2026-04-02T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61888
published_at 2026-04-04T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61859
published_at 2026-04-07T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61908
published_at 2026-04-08T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61924
published_at 2026-04-09T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61945
published_at 2026-04-11T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61934
published_at 2026-04-12T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61913
published_at 2026-04-13T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61957
published_at 2026-04-16T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61961
published_at 2026-04-18T12:55:00Z
11
value 0.00419
scoring_system epss
scoring_elements 0.61784
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2580
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796882
reference_id 1796882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796882
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2580
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sng-6dfg-yfa9
55
url VCID-8u32-x538-h3d7
vulnerability_id VCID-8u32-x538-h3d7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14619.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14619
reference_id
reference_type
scores
0
value 0.00546
scoring_system epss
scoring_elements 0.67746
published_at 2026-04-01T12:55:00Z
1
value 0.00546
scoring_system epss
scoring_elements 0.6778
published_at 2026-04-02T12:55:00Z
2
value 0.00546
scoring_system epss
scoring_elements 0.67849
published_at 2026-04-21T12:55:00Z
3
value 0.00546
scoring_system epss
scoring_elements 0.678
published_at 2026-04-04T12:55:00Z
4
value 0.00546
scoring_system epss
scoring_elements 0.67781
published_at 2026-04-07T12:55:00Z
5
value 0.00546
scoring_system epss
scoring_elements 0.67832
published_at 2026-04-08T12:55:00Z
6
value 0.00546
scoring_system epss
scoring_elements 0.67846
published_at 2026-04-09T12:55:00Z
7
value 0.00546
scoring_system epss
scoring_elements 0.67869
published_at 2026-04-11T12:55:00Z
8
value 0.00546
scoring_system epss
scoring_elements 0.67856
published_at 2026-04-12T12:55:00Z
9
value 0.00546
scoring_system epss
scoring_elements 0.67819
published_at 2026-04-13T12:55:00Z
10
value 0.00546
scoring_system epss
scoring_elements 0.67855
published_at 2026-04-16T12:55:00Z
11
value 0.00546
scoring_system epss
scoring_elements 0.67868
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14619
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865960
reference_id 1865960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865960
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14619
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8u32-x538-h3d7
56
url VCID-8u69-g2m8-e3eh
vulnerability_id VCID-8u69-g2m8-e3eh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2573.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2573
reference_id
reference_type
scores
0
value 0.00696
scoring_system epss
scoring_elements 0.7188
published_at 2026-04-01T12:55:00Z
1
value 0.00696
scoring_system epss
scoring_elements 0.71888
published_at 2026-04-02T12:55:00Z
2
value 0.00696
scoring_system epss
scoring_elements 0.71948
published_at 2026-04-21T12:55:00Z
3
value 0.00696
scoring_system epss
scoring_elements 0.71907
published_at 2026-04-04T12:55:00Z
4
value 0.00696
scoring_system epss
scoring_elements 0.71879
published_at 2026-04-07T12:55:00Z
5
value 0.00696
scoring_system epss
scoring_elements 0.71918
published_at 2026-04-13T12:55:00Z
6
value 0.00696
scoring_system epss
scoring_elements 0.71929
published_at 2026-04-09T12:55:00Z
7
value 0.00696
scoring_system epss
scoring_elements 0.71953
published_at 2026-04-11T12:55:00Z
8
value 0.00696
scoring_system epss
scoring_elements 0.71936
published_at 2026-04-12T12:55:00Z
9
value 0.00696
scoring_system epss
scoring_elements 0.71959
published_at 2026-04-16T12:55:00Z
10
value 0.00696
scoring_system epss
scoring_elements 0.71963
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2573
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1798576
reference_id 1798576
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1798576
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:05Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:05Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2573
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8u69-g2m8-e3eh
57
url VCID-9e62-4r97-a7b6
vulnerability_id VCID-9e62-4r97-a7b6
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14547.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14547.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14547
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53285
published_at 2026-04-01T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.53308
published_at 2026-04-02T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53392
published_at 2026-04-21T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53334
published_at 2026-04-04T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53303
published_at 2026-04-07T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53356
published_at 2026-04-08T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.5335
published_at 2026-04-09T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53402
published_at 2026-04-11T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.53385
published_at 2026-04-12T12:55:00Z
9
value 0.003
scoring_system epss
scoring_elements 0.53369
published_at 2026-04-13T12:55:00Z
10
value 0.003
scoring_system epss
scoring_elements 0.53406
published_at 2026-04-16T12:55:00Z
11
value 0.003
scoring_system epss
scoring_elements 0.53412
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14547
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865948
reference_id 1865948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865948
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14547
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9e62-4r97-a7b6
58
url VCID-9nry-61xw-cug4
vulnerability_id VCID-9nry-61xw-cug4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14869
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14869
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890777
reference_id 1890777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890777
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:09Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14869
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nry-61xw-cug4
59
url VCID-9pzq-dxgg-e7gv
vulnerability_id VCID-9pzq-dxgg-e7gv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2570.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2570.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2570
reference_id
reference_type
scores
0
value 0.00294
scoring_system epss
scoring_elements 0.52582
published_at 2026-04-01T12:55:00Z
1
value 0.00294
scoring_system epss
scoring_elements 0.52626
published_at 2026-04-02T12:55:00Z
2
value 0.00294
scoring_system epss
scoring_elements 0.52712
published_at 2026-04-21T12:55:00Z
3
value 0.00294
scoring_system epss
scoring_elements 0.52664
published_at 2026-04-09T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52714
published_at 2026-04-11T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52697
published_at 2026-04-12T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52682
published_at 2026-04-13T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52721
published_at 2026-04-16T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52728
published_at 2026-04-18T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.52652
published_at 2026-04-04T12:55:00Z
10
value 0.00294
scoring_system epss
scoring_elements 0.52619
published_at 2026-04-07T12:55:00Z
11
value 0.00294
scoring_system epss
scoring_elements 0.52669
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2570
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1798559
reference_id 1798559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1798559
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:13Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:13Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2570
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pzq-dxgg-e7gv
60
url VCID-9ycb-mjma-7qfv
vulnerability_id VCID-9ycb-mjma-7qfv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14839
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14839
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890766
reference_id 1890766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890766
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:37Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14839
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ycb-mjma-7qfv
61
url VCID-a8ss-rpq3-j3ez
vulnerability_id VCID-a8ss-rpq3-j3ez
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14564
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42914
published_at 2026-04-21T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42931
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42929
published_at 2026-04-13T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42989
published_at 2026-04-16T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42976
published_at 2026-04-18T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42861
published_at 2026-04-01T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42958
published_at 2026-04-09T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42896
published_at 2026-04-07T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42946
published_at 2026-04-12T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.42981
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14564
1
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:13Z/
url https://security.gentoo.org/glsa/202105-27
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14564
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a8ss-rpq3-j3ez
62
url VCID-aaq9-6yhn-afbx
vulnerability_id VCID-aaq9-6yhn-afbx
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14777
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14777
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890744
reference_id 1890744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890744
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14777
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aaq9-6yhn-afbx
63
url VCID-aczd-32sa-fffg
vulnerability_id VCID-aczd-32sa-fffg
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14829
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14829
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890761
reference_id 1890761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890761
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:49Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14829
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aczd-32sa-fffg
64
url VCID-aeg6-jvdz-7fh2
vulnerability_id VCID-aeg6-jvdz-7fh2
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2790.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2790.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2790
reference_id
reference_type
scores
0
value 0.00471
scoring_system epss
scoring_elements 0.64507
published_at 2026-04-01T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64622
published_at 2026-04-21T12:55:00Z
2
value 0.00471
scoring_system epss
scoring_elements 0.64561
published_at 2026-04-02T12:55:00Z
3
value 0.00471
scoring_system epss
scoring_elements 0.64589
published_at 2026-04-13T12:55:00Z
4
value 0.00471
scoring_system epss
scoring_elements 0.64547
published_at 2026-04-07T12:55:00Z
5
value 0.00471
scoring_system epss
scoring_elements 0.64596
published_at 2026-04-08T12:55:00Z
6
value 0.00471
scoring_system epss
scoring_elements 0.64612
published_at 2026-04-09T12:55:00Z
7
value 0.00471
scoring_system epss
scoring_elements 0.6463
published_at 2026-04-11T12:55:00Z
8
value 0.00471
scoring_system epss
scoring_elements 0.64617
published_at 2026-04-12T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.64624
published_at 2026-04-16T12:55:00Z
10
value 0.00471
scoring_system epss
scoring_elements 0.64636
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2790
2
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:24Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
3
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:24Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830057
reference_id 1830057
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830057
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2790
reference_id CVE-2020-2790
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2790
12
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:24Z/
url https://security.gentoo.org/glsa/202105-27
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2790
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aeg6-jvdz-7fh2
65
url VCID-b4kn-wdpj-a3dm
vulnerability_id VCID-b4kn-wdpj-a3dm
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14550.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14550
reference_id
reference_type
scores
0
value 0.00788
scoring_system epss
scoring_elements 0.73789
published_at 2026-04-01T12:55:00Z
1
value 0.00788
scoring_system epss
scoring_elements 0.73799
published_at 2026-04-02T12:55:00Z
2
value 0.00788
scoring_system epss
scoring_elements 0.73885
published_at 2026-04-18T12:55:00Z
3
value 0.00788
scoring_system epss
scoring_elements 0.73822
published_at 2026-04-04T12:55:00Z
4
value 0.00788
scoring_system epss
scoring_elements 0.73792
published_at 2026-04-07T12:55:00Z
5
value 0.00788
scoring_system epss
scoring_elements 0.73826
published_at 2026-04-08T12:55:00Z
6
value 0.00788
scoring_system epss
scoring_elements 0.73839
published_at 2026-04-09T12:55:00Z
7
value 0.00788
scoring_system epss
scoring_elements 0.73861
published_at 2026-04-11T12:55:00Z
8
value 0.00788
scoring_system epss
scoring_elements 0.73843
published_at 2026-04-12T12:55:00Z
9
value 0.00788
scoring_system epss
scoring_elements 0.73835
published_at 2026-04-13T12:55:00Z
10
value 0.00788
scoring_system epss
scoring_elements 0.73877
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14550
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865949
reference_id 1865949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865949
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://security.netapp.com/advisory/ntap-20210622-0001/
reference_id ntap-20210622-0001
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/
url https://security.netapp.com/advisory/ntap-20210622-0001/
7
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1258
8
reference_url https://access.redhat.com/errata/RHSA-2019:2327
reference_id RHSA-2019:2327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2327
9
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
10
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
11
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
12
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
14
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14550
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4kn-wdpj-a3dm
66
url VCID-b67d-16a1-b3at
vulnerability_id VCID-b67d-16a1-b3at
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2584.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2584
reference_id
reference_type
scores
0
value 0.00476
scoring_system epss
scoring_elements 0.64926
published_at 2026-04-21T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.65972
published_at 2026-04-01T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.66059
published_at 2026-04-08T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.66071
published_at 2026-04-09T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.6609
published_at 2026-04-11T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.66077
published_at 2026-04-12T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.66047
published_at 2026-04-13T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.66082
published_at 2026-04-16T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.66096
published_at 2026-04-18T12:55:00Z
9
value 0.00502
scoring_system epss
scoring_elements 0.66014
published_at 2026-04-02T12:55:00Z
10
value 0.00502
scoring_system epss
scoring_elements 0.66043
published_at 2026-04-04T12:55:00Z
11
value 0.00502
scoring_system epss
scoring_elements 0.6601
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2584
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796883
reference_id 1796883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796883
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:52Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:52Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2584
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b67d-16a1-b3at
67
url VCID-c1gb-f47t-2fha
vulnerability_id VCID-c1gb-f47t-2fha
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2012.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2012
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2012
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922422
reference_id 1922422
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922422
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2012
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c1gb-f47t-2fha
68
url VCID-c6rw-mujf-qqbj
vulnerability_id VCID-c6rw-mujf-qqbj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2030
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2030
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922392
reference_id 1922392
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922392
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2030
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6rw-mujf-qqbj
69
url VCID-cd89-a3te-cyfv
vulnerability_id VCID-cd89-a3te-cyfv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14634.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14634
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48219
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48255
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48334
published_at 2026-04-18T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48275
published_at 2026-04-04T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48227
published_at 2026-04-07T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48283
published_at 2026-04-08T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48277
published_at 2026-04-09T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48302
published_at 2026-04-11T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48276
published_at 2026-04-12T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48288
published_at 2026-04-21T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.48339
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14634
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865967
reference_id 1865967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865967
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:52Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:52Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14634
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cd89-a3te-cyfv
70
url VCID-ch22-5f87-tfhw
vulnerability_id VCID-ch22-5f87-tfhw
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2061
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2061
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922403
reference_id 1922403
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922403
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2061
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ch22-5f87-tfhw
71
url VCID-cqpn-sgg6-4khh
vulnerability_id VCID-cqpn-sgg6-4khh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14575.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14575.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14575
reference_id
reference_type
scores
0
value 0.00432
scoring_system epss
scoring_elements 0.62543
published_at 2026-04-01T12:55:00Z
1
value 0.00432
scoring_system epss
scoring_elements 0.62601
published_at 2026-04-02T12:55:00Z
2
value 0.00432
scoring_system epss
scoring_elements 0.62681
published_at 2026-04-21T12:55:00Z
3
value 0.00432
scoring_system epss
scoring_elements 0.62634
published_at 2026-04-04T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62599
published_at 2026-04-07T12:55:00Z
5
value 0.00432
scoring_system epss
scoring_elements 0.62649
published_at 2026-04-08T12:55:00Z
6
value 0.00432
scoring_system epss
scoring_elements 0.62666
published_at 2026-04-09T12:55:00Z
7
value 0.00432
scoring_system epss
scoring_elements 0.62684
published_at 2026-04-11T12:55:00Z
8
value 0.00432
scoring_system epss
scoring_elements 0.62674
published_at 2026-04-12T12:55:00Z
9
value 0.00432
scoring_system epss
scoring_elements 0.62651
published_at 2026-04-13T12:55:00Z
10
value 0.00432
scoring_system epss
scoring_elements 0.62691
published_at 2026-04-16T12:55:00Z
11
value 0.00432
scoring_system epss
scoring_elements 0.62699
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14575
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865954
reference_id 1865954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865954
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14575
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cqpn-sgg6-4khh
72
url VCID-cr9r-v269-7qan
vulnerability_id VCID-cr9r-v269-7qan
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14867
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14867
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890775
reference_id 1890775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890775
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:11Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14867
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr9r-v269-7qan
73
url VCID-d5hc-4qz5-3uag
vulnerability_id VCID-d5hc-4qz5-3uag
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14672
reference_id
reference_type
scores
0
value 0.01097
scoring_system epss
scoring_elements 0.77954
published_at 2026-04-01T12:55:00Z
1
value 0.01097
scoring_system epss
scoring_elements 0.77961
published_at 2026-04-02T12:55:00Z
2
value 0.01097
scoring_system epss
scoring_elements 0.78038
published_at 2026-04-21T12:55:00Z
3
value 0.01097
scoring_system epss
scoring_elements 0.7799
published_at 2026-04-04T12:55:00Z
4
value 0.01097
scoring_system epss
scoring_elements 0.77971
published_at 2026-04-07T12:55:00Z
5
value 0.01097
scoring_system epss
scoring_elements 0.77998
published_at 2026-04-08T12:55:00Z
6
value 0.01097
scoring_system epss
scoring_elements 0.78002
published_at 2026-04-09T12:55:00Z
7
value 0.01097
scoring_system epss
scoring_elements 0.78029
published_at 2026-04-11T12:55:00Z
8
value 0.01097
scoring_system epss
scoring_elements 0.78012
published_at 2026-04-12T12:55:00Z
9
value 0.01097
scoring_system epss
scoring_elements 0.78011
published_at 2026-04-13T12:55:00Z
10
value 0.01097
scoring_system epss
scoring_elements 0.78046
published_at 2026-04-16T12:55:00Z
11
value 0.01097
scoring_system epss
scoring_elements 0.78045
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14672
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890737
reference_id 1890737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890737
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14672
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d5hc-4qz5-3uag
74
url VCID-d5js-9kvw-dyf9
vulnerability_id VCID-d5js-9kvw-dyf9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2122
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2122
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922411
reference_id 1922411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922411
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2122
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d5js-9kvw-dyf9
75
url VCID-da5g-ea4u-qfeh
vulnerability_id VCID-da5g-ea4u-qfeh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14844
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14844
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890767
reference_id 1890767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890767
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:32Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14844
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-da5g-ea4u-qfeh
76
url VCID-dcyd-xspe-q7eh
vulnerability_id VCID-dcyd-xspe-q7eh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14791
reference_id
reference_type
scores
0
value 0.00423
scoring_system epss
scoring_elements 0.62004
published_at 2026-04-01T12:55:00Z
1
value 0.00423
scoring_system epss
scoring_elements 0.62063
published_at 2026-04-02T12:55:00Z
2
value 0.00423
scoring_system epss
scoring_elements 0.62155
published_at 2026-04-21T12:55:00Z
3
value 0.00423
scoring_system epss
scoring_elements 0.62095
published_at 2026-04-04T12:55:00Z
4
value 0.00423
scoring_system epss
scoring_elements 0.62064
published_at 2026-04-07T12:55:00Z
5
value 0.00423
scoring_system epss
scoring_elements 0.62114
published_at 2026-04-08T12:55:00Z
6
value 0.00423
scoring_system epss
scoring_elements 0.62132
published_at 2026-04-09T12:55:00Z
7
value 0.00423
scoring_system epss
scoring_elements 0.62152
published_at 2026-04-11T12:55:00Z
8
value 0.00423
scoring_system epss
scoring_elements 0.62141
published_at 2026-04-12T12:55:00Z
9
value 0.00423
scoring_system epss
scoring_elements 0.6212
published_at 2026-04-13T12:55:00Z
10
value 0.00423
scoring_system epss
scoring_elements 0.62164
published_at 2026-04-16T12:55:00Z
11
value 0.00423
scoring_system epss
scoring_elements 0.6217
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14791
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890749
reference_id 1890749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890749
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14791
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyd-xspe-q7eh
77
url VCID-dgx8-xnbw-4bdy
vulnerability_id VCID-dgx8-xnbw-4bdy
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2660.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2660.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2660
reference_id
reference_type
scores
0
value 0.00394
scoring_system epss
scoring_elements 0.60359
published_at 2026-04-21T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61541
published_at 2026-04-01T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61664
published_at 2026-04-08T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61679
published_at 2026-04-09T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.617
published_at 2026-04-11T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61689
published_at 2026-04-12T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61669
published_at 2026-04-13T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61711
published_at 2026-04-16T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61716
published_at 2026-04-18T12:55:00Z
9
value 0.00415
scoring_system epss
scoring_elements 0.61615
published_at 2026-04-02T12:55:00Z
10
value 0.00415
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-04T12:55:00Z
11
value 0.00415
scoring_system epss
scoring_elements 0.61616
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2660
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796886
reference_id 1796886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796886
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:29Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:29Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2660
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgx8-xnbw-4bdy
78
url VCID-dsp1-f2v8-z7fb
vulnerability_id VCID-dsp1-f2v8-z7fb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2038
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2038
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922396
reference_id 1922396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922396
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2038
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dsp1-f2v8-z7fb
79
url VCID-e1p7-4g2g-wuac
vulnerability_id VCID-e1p7-4g2g-wuac
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2016.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2016.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2016
reference_id
reference_type
scores
0
value 0.00354
scoring_system epss
scoring_elements 0.5765
published_at 2026-04-01T12:55:00Z
1
value 0.00354
scoring_system epss
scoring_elements 0.57735
published_at 2026-04-02T12:55:00Z
2
value 0.00354
scoring_system epss
scoring_elements 0.57763
published_at 2026-04-21T12:55:00Z
3
value 0.00354
scoring_system epss
scoring_elements 0.57756
published_at 2026-04-04T12:55:00Z
4
value 0.00354
scoring_system epss
scoring_elements 0.57729
published_at 2026-04-07T12:55:00Z
5
value 0.00354
scoring_system epss
scoring_elements 0.57784
published_at 2026-04-08T12:55:00Z
6
value 0.00354
scoring_system epss
scoring_elements 0.57787
published_at 2026-04-18T12:55:00Z
7
value 0.00354
scoring_system epss
scoring_elements 0.57803
published_at 2026-04-11T12:55:00Z
8
value 0.00354
scoring_system epss
scoring_elements 0.57781
published_at 2026-04-12T12:55:00Z
9
value 0.00354
scoring_system epss
scoring_elements 0.5776
published_at 2026-04-13T12:55:00Z
10
value 0.00354
scoring_system epss
scoring_elements 0.57789
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2016
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922420
reference_id 1922420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922420
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2016
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1p7-4g2g-wuac
80
url VCID-e3qg-3jxq-ukeb
vulnerability_id VCID-e3qg-3jxq-ukeb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14760.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14760
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.31966
published_at 2026-04-01T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32094
published_at 2026-04-02T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.31951
published_at 2026-04-21T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32007
published_at 2026-04-08T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32037
published_at 2026-04-09T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.3204
published_at 2026-04-11T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32001
published_at 2026-04-16T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.31968
published_at 2026-04-13T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.31978
published_at 2026-04-18T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32133
published_at 2026-04-04T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.31956
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14760
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890735
reference_id 1890735
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890735
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:09Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14760
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e3qg-3jxq-ukeb
81
url VCID-eakf-rhk4-m3g8
vulnerability_id VCID-eakf-rhk4-m3g8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2154
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-21T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22765
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-04T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-07T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22675
published_at 2026-04-08T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22726
published_at 2026-04-09T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22746
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22707
published_at 2026-04-12T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.2265
published_at 2026-04-13T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22666
published_at 2026-04-16T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22662
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2154
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951752
reference_id 1951752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951752
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
reference_id 988428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
6
reference_url https://security.archlinux.org/ASA-202105-14
reference_id ASA-202105-14
reference_type
scores
url https://security.archlinux.org/ASA-202105-14
7
reference_url https://security.archlinux.org/AVG-1882
reference_id AVG-1882
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1882
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
reference_id DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
reference_id GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
10
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://security.gentoo.org/glsa/202105-27
11
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://security.gentoo.org/glsa/202105-28
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
reference_id PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
13
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
14
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
15
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
16
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
17
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
18
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
19
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
20
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2154
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eakf-rhk4-m3g8
82
url VCID-eh72-pgfd-x3dy
vulnerability_id VCID-eh72-pgfd-x3dy
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2070
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2070
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922405
reference_id 1922405
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922405
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2070
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eh72-pgfd-x3dy
83
url VCID-ert5-smsw-1ba2
vulnerability_id VCID-ert5-smsw-1ba2
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14771
reference_id
reference_type
scores
0
value 0.00226
scoring_system epss
scoring_elements 0.45237
published_at 2026-04-01T12:55:00Z
1
value 0.00226
scoring_system epss
scoring_elements 0.45319
published_at 2026-04-02T12:55:00Z
2
value 0.00226
scoring_system epss
scoring_elements 0.45327
published_at 2026-04-21T12:55:00Z
3
value 0.00226
scoring_system epss
scoring_elements 0.45339
published_at 2026-04-09T12:55:00Z
4
value 0.00226
scoring_system epss
scoring_elements 0.4536
published_at 2026-04-11T12:55:00Z
5
value 0.00226
scoring_system epss
scoring_elements 0.45329
published_at 2026-04-12T12:55:00Z
6
value 0.00226
scoring_system epss
scoring_elements 0.4533
published_at 2026-04-13T12:55:00Z
7
value 0.00226
scoring_system epss
scoring_elements 0.45381
published_at 2026-04-16T12:55:00Z
8
value 0.00226
scoring_system epss
scoring_elements 0.45377
published_at 2026-04-18T12:55:00Z
9
value 0.00226
scoring_system epss
scoring_elements 0.4534
published_at 2026-04-04T12:55:00Z
10
value 0.00226
scoring_system epss
scoring_elements 0.45283
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14771
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890740
reference_id 1890740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890740
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:55Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14771
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ert5-smsw-1ba2
84
url VCID-fv24-tu6p-17fj
vulnerability_id VCID-fv24-tu6p-17fj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14540.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14540
reference_id
reference_type
scores
0
value 0.00487
scoring_system epss
scoring_elements 0.65324
published_at 2026-04-01T12:55:00Z
1
value 0.00487
scoring_system epss
scoring_elements 0.65373
published_at 2026-04-02T12:55:00Z
2
value 0.00487
scoring_system epss
scoring_elements 0.65436
published_at 2026-04-21T12:55:00Z
3
value 0.00487
scoring_system epss
scoring_elements 0.65398
published_at 2026-04-04T12:55:00Z
4
value 0.00487
scoring_system epss
scoring_elements 0.65363
published_at 2026-04-07T12:55:00Z
5
value 0.00487
scoring_system epss
scoring_elements 0.65416
published_at 2026-04-08T12:55:00Z
6
value 0.00487
scoring_system epss
scoring_elements 0.65427
published_at 2026-04-09T12:55:00Z
7
value 0.00487
scoring_system epss
scoring_elements 0.65445
published_at 2026-04-11T12:55:00Z
8
value 0.00487
scoring_system epss
scoring_elements 0.65431
published_at 2026-04-12T12:55:00Z
9
value 0.00487
scoring_system epss
scoring_elements 0.65404
published_at 2026-04-13T12:55:00Z
10
value 0.00487
scoring_system epss
scoring_elements 0.6544
published_at 2026-04-16T12:55:00Z
11
value 0.00487
scoring_system epss
scoring_elements 0.65451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14540
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865947
reference_id 1865947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865947
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14540
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fv24-tu6p-17fj
85
url VCID-fyxd-xzv7-jkgv
vulnerability_id VCID-fyxd-xzv7-jkgv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14725.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14725
reference_id
reference_type
scores
0
value 0.00372
scoring_system epss
scoring_elements 0.59027
published_at 2026-04-18T12:55:00Z
1
value 0.00372
scoring_system epss
scoring_elements 0.58948
published_at 2026-04-07T12:55:00Z
2
value 0.00372
scoring_system epss
scoring_elements 0.59
published_at 2026-04-08T12:55:00Z
3
value 0.00372
scoring_system epss
scoring_elements 0.59006
published_at 2026-04-09T12:55:00Z
4
value 0.00372
scoring_system epss
scoring_elements 0.59026
published_at 2026-04-11T12:55:00Z
5
value 0.00372
scoring_system epss
scoring_elements 0.59007
published_at 2026-04-21T12:55:00Z
6
value 0.00372
scoring_system epss
scoring_elements 0.58989
published_at 2026-04-13T12:55:00Z
7
value 0.00372
scoring_system epss
scoring_elements 0.59023
published_at 2026-04-16T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61888
published_at 2026-04-04T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61784
published_at 2026-04-01T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61858
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14725
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865977
reference_id 1865977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865977
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:36Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20200731-0006/
reference_id ntap-20200731-0006
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:36Z/
url https://security.netapp.com/advisory/ntap-20200731-0006/
5
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
6
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
7
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
8
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14725
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fyxd-xzv7-jkgv
86
url VCID-fz6n-wrp4-2udn
vulnerability_id VCID-fz6n-wrp4-2udn
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14853
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45193
published_at 2026-04-21T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45186
published_at 2026-04-02T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45226
published_at 2026-04-11T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45194
published_at 2026-04-12T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45196
published_at 2026-04-13T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45248
published_at 2026-04-16T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45242
published_at 2026-04-18T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45105
published_at 2026-04-01T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45208
published_at 2026-04-04T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45151
published_at 2026-04-07T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.45205
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14853
1
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:21Z/
url https://security.gentoo.org/glsa/202105-27
2
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14853
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fz6n-wrp4-2udn
87
url VCID-g58r-8vcn-bfea
vulnerability_id VCID-g58r-8vcn-bfea
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2087
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25744
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25815
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25615
published_at 2026-04-21T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25747
published_at 2026-04-09T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25757
published_at 2026-04-11T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25717
published_at 2026-04-12T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25659
published_at 2026-04-13T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25661
published_at 2026-04-16T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25644
published_at 2026-04-18T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25858
published_at 2026-04-04T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25627
published_at 2026-04-07T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.257
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2087
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922408
reference_id 1922408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922408
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2087
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g58r-8vcn-bfea
88
url VCID-gd99-z617-n3h8
vulnerability_id VCID-gd99-z617-n3h8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2895.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2895.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2895
reference_id
reference_type
scores
0
value 0.00487
scoring_system epss
scoring_elements 0.65324
published_at 2026-04-01T12:55:00Z
1
value 0.00487
scoring_system epss
scoring_elements 0.65436
published_at 2026-04-21T12:55:00Z
2
value 0.00487
scoring_system epss
scoring_elements 0.65373
published_at 2026-04-02T12:55:00Z
3
value 0.00487
scoring_system epss
scoring_elements 0.65398
published_at 2026-04-04T12:55:00Z
4
value 0.00487
scoring_system epss
scoring_elements 0.65363
published_at 2026-04-07T12:55:00Z
5
value 0.00487
scoring_system epss
scoring_elements 0.65416
published_at 2026-04-08T12:55:00Z
6
value 0.00487
scoring_system epss
scoring_elements 0.65427
published_at 2026-04-09T12:55:00Z
7
value 0.00487
scoring_system epss
scoring_elements 0.65445
published_at 2026-04-11T12:55:00Z
8
value 0.00487
scoring_system epss
scoring_elements 0.65431
published_at 2026-04-12T12:55:00Z
9
value 0.00487
scoring_system epss
scoring_elements 0.65404
published_at 2026-04-13T12:55:00Z
10
value 0.00487
scoring_system epss
scoring_elements 0.6544
published_at 2026-04-16T12:55:00Z
11
value 0.00487
scoring_system epss
scoring_elements 0.65451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2895
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830066
reference_id 1830066
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830066
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2895
reference_id CVE-2020-2895
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2895
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2895
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gd99-z617-n3h8
89
url VCID-getz-u39m-ubgv
vulnerability_id VCID-getz-u39m-ubgv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1998
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.51073
published_at 2026-04-01T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51126
published_at 2026-04-02T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51192
published_at 2026-04-21T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.5115
published_at 2026-04-04T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51107
published_at 2026-04-07T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51163
published_at 2026-04-08T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51159
published_at 2026-04-09T12:55:00Z
7
value 0.00277
scoring_system epss
scoring_elements 0.51204
published_at 2026-04-11T12:55:00Z
8
value 0.00277
scoring_system epss
scoring_elements 0.51182
published_at 2026-04-12T12:55:00Z
9
value 0.00277
scoring_system epss
scoring_elements 0.51168
published_at 2026-04-13T12:55:00Z
10
value 0.00277
scoring_system epss
scoring_elements 0.51207
published_at 2026-04-16T12:55:00Z
11
value 0.00277
scoring_system epss
scoring_elements 0.51213
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1998
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922378
reference_id 1922378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922378
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
7
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
8
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
9
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
10
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-1998
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-getz-u39m-ubgv
90
url VCID-gf34-43aa-d3gj
vulnerability_id VCID-gf34-43aa-d3gj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2774.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2774
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61495
published_at 2026-04-01T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61654
published_at 2026-04-21T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.6157
published_at 2026-04-02T12:55:00Z
3
value 0.00414
scoring_system epss
scoring_elements 0.61599
published_at 2026-04-04T12:55:00Z
4
value 0.00414
scoring_system epss
scoring_elements 0.61569
published_at 2026-04-07T12:55:00Z
5
value 0.00414
scoring_system epss
scoring_elements 0.61617
published_at 2026-04-08T12:55:00Z
6
value 0.00414
scoring_system epss
scoring_elements 0.61632
published_at 2026-04-09T12:55:00Z
7
value 0.00414
scoring_system epss
scoring_elements 0.61653
published_at 2026-04-11T12:55:00Z
8
value 0.00414
scoring_system epss
scoring_elements 0.61642
published_at 2026-04-12T12:55:00Z
9
value 0.00414
scoring_system epss
scoring_elements 0.61622
published_at 2026-04-13T12:55:00Z
10
value 0.00414
scoring_system epss
scoring_elements 0.61664
published_at 2026-04-16T12:55:00Z
11
value 0.00414
scoring_system epss
scoring_elements 0.61669
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2774
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830054
reference_id 1830054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830054
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2774
reference_id CVE-2020-2774
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2774
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
20
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
21
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
22
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2774
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gf34-43aa-d3gj
91
url VCID-gkdp-dtuv-nuf8
vulnerability_id VCID-gkdp-dtuv-nuf8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2804.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2804
reference_id
reference_type
scores
0
value 0.00983
scoring_system epss
scoring_elements 0.76738
published_at 2026-04-01T12:55:00Z
1
value 0.00983
scoring_system epss
scoring_elements 0.76835
published_at 2026-04-21T12:55:00Z
2
value 0.00983
scoring_system epss
scoring_elements 0.76742
published_at 2026-04-02T12:55:00Z
3
value 0.00983
scoring_system epss
scoring_elements 0.7677
published_at 2026-04-04T12:55:00Z
4
value 0.00983
scoring_system epss
scoring_elements 0.76752
published_at 2026-04-07T12:55:00Z
5
value 0.00983
scoring_system epss
scoring_elements 0.76783
published_at 2026-04-08T12:55:00Z
6
value 0.00983
scoring_system epss
scoring_elements 0.76794
published_at 2026-04-09T12:55:00Z
7
value 0.00983
scoring_system epss
scoring_elements 0.76823
published_at 2026-04-11T12:55:00Z
8
value 0.00983
scoring_system epss
scoring_elements 0.76803
published_at 2026-04-12T12:55:00Z
9
value 0.00983
scoring_system epss
scoring_elements 0.76795
published_at 2026-04-13T12:55:00Z
10
value 0.00983
scoring_system epss
scoring_elements 0.76838
published_at 2026-04-16T12:55:00Z
11
value 0.00983
scoring_system epss
scoring_elements 0.76843
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2804
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830058
reference_id 1830058
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830058
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2804
reference_id CVE-2020-2804
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2804
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2804
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gkdp-dtuv-nuf8
92
url VCID-gmxv-dxp3-cuhq
vulnerability_id VCID-gmxv-dxp3-cuhq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2028
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2028
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922391
reference_id 1922391
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922391
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2028
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmxv-dxp3-cuhq
93
url VCID-gqsy-vngu-8fa5
vulnerability_id VCID-gqsy-vngu-8fa5
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2589.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2589.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2589
reference_id
reference_type
scores
0
value 0.00343
scoring_system epss
scoring_elements 0.56973
published_at 2026-04-21T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58173
published_at 2026-04-01T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58307
published_at 2026-04-08T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58313
published_at 2026-04-09T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58331
published_at 2026-04-11T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58308
published_at 2026-04-12T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58288
published_at 2026-04-13T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.5832
published_at 2026-04-16T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58323
published_at 2026-04-18T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58259
published_at 2026-04-02T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58279
published_at 2026-04-04T12:55:00Z
11
value 0.00362
scoring_system epss
scoring_elements 0.58253
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2589
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796885
reference_id 1796885
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796885
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:46Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:46Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2589
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqsy-vngu-8fa5
94
url VCID-gt3h-mfuf-53ew
vulnerability_id VCID-gt3h-mfuf-53ew
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14663.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14663
reference_id
reference_type
scores
0
value 0.00681
scoring_system epss
scoring_elements 0.71544
published_at 2026-04-01T12:55:00Z
1
value 0.00681
scoring_system epss
scoring_elements 0.71551
published_at 2026-04-02T12:55:00Z
2
value 0.00681
scoring_system epss
scoring_elements 0.71612
published_at 2026-04-21T12:55:00Z
3
value 0.00681
scoring_system epss
scoring_elements 0.71542
published_at 2026-04-07T12:55:00Z
4
value 0.00681
scoring_system epss
scoring_elements 0.71582
published_at 2026-04-08T12:55:00Z
5
value 0.00681
scoring_system epss
scoring_elements 0.71593
published_at 2026-04-09T12:55:00Z
6
value 0.00681
scoring_system epss
scoring_elements 0.71616
published_at 2026-04-11T12:55:00Z
7
value 0.00681
scoring_system epss
scoring_elements 0.716
published_at 2026-04-12T12:55:00Z
8
value 0.00681
scoring_system epss
scoring_elements 0.71581
published_at 2026-04-13T12:55:00Z
9
value 0.00681
scoring_system epss
scoring_elements 0.71626
published_at 2026-04-16T12:55:00Z
10
value 0.00681
scoring_system epss
scoring_elements 0.71631
published_at 2026-04-18T12:55:00Z
11
value 0.00681
scoring_system epss
scoring_elements 0.71569
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14663
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865972
reference_id 1865972
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865972
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:52Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:52Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14663
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gt3h-mfuf-53ew
95
url VCID-h2r2-p8v7-sfc6
vulnerability_id VCID-h2r2-p8v7-sfc6
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14838
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48171
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48208
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.4824
published_at 2026-04-21T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48235
published_at 2026-04-08T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48229
published_at 2026-04-09T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48254
published_at 2026-04-11T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48239
published_at 2026-04-13T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.4829
published_at 2026-04-16T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48285
published_at 2026-04-18T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48228
published_at 2026-04-12T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.48179
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14838
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890765
reference_id 1890765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890765
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:38Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14838
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2r2-p8v7-sfc6
96
url VCID-h7qz-5f8y-4bd7
vulnerability_id VCID-h7qz-5f8y-4bd7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14591.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14591
reference_id
reference_type
scores
0
value 0.00462
scoring_system epss
scoring_elements 0.64089
published_at 2026-04-01T12:55:00Z
1
value 0.00462
scoring_system epss
scoring_elements 0.64145
published_at 2026-04-02T12:55:00Z
2
value 0.00462
scoring_system epss
scoring_elements 0.64207
published_at 2026-04-21T12:55:00Z
3
value 0.00462
scoring_system epss
scoring_elements 0.64132
published_at 2026-04-07T12:55:00Z
4
value 0.00462
scoring_system epss
scoring_elements 0.64183
published_at 2026-04-08T12:55:00Z
5
value 0.00462
scoring_system epss
scoring_elements 0.64199
published_at 2026-04-09T12:55:00Z
6
value 0.00462
scoring_system epss
scoring_elements 0.64212
published_at 2026-04-11T12:55:00Z
7
value 0.00462
scoring_system epss
scoring_elements 0.64201
published_at 2026-04-12T12:55:00Z
8
value 0.00462
scoring_system epss
scoring_elements 0.64173
published_at 2026-04-13T12:55:00Z
9
value 0.00462
scoring_system epss
scoring_elements 0.64208
published_at 2026-04-16T12:55:00Z
10
value 0.00462
scoring_system epss
scoring_elements 0.64219
published_at 2026-04-18T12:55:00Z
11
value 0.00462
scoring_system epss
scoring_elements 0.64172
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14591
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865957
reference_id 1865957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865957
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:39Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:39Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14591
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qz-5f8y-4bd7
97
url VCID-hjkk-adkv-yfdu
vulnerability_id VCID-hjkk-adkv-yfdu
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14799
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.46097
published_at 2026-04-01T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46137
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.4616
published_at 2026-04-21T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.46161
published_at 2026-04-08T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46182
published_at 2026-04-11T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46153
published_at 2026-04-12T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46162
published_at 2026-04-13T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.4622
published_at 2026-04-16T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46216
published_at 2026-04-18T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46158
published_at 2026-04-09T12:55:00Z
10
value 0.00233
scoring_system epss
scoring_elements 0.46105
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14799
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890752
reference_id 1890752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890752
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:15Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
6
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
7
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
8
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14799
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkk-adkv-yfdu
98
url VCID-hrbc-2cpw-5be7
vulnerability_id VCID-hrbc-2cpw-5be7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14773
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14773
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890742
reference_id 1890742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890742
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14773
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrbc-2cpw-5be7
99
url VCID-hwm3-w4vk-q3c7
vulnerability_id VCID-hwm3-w4vk-q3c7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14597.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14597
reference_id
reference_type
scores
0
value 0.00432
scoring_system epss
scoring_elements 0.62543
published_at 2026-04-01T12:55:00Z
1
value 0.00432
scoring_system epss
scoring_elements 0.62601
published_at 2026-04-02T12:55:00Z
2
value 0.00432
scoring_system epss
scoring_elements 0.62681
published_at 2026-04-21T12:55:00Z
3
value 0.00432
scoring_system epss
scoring_elements 0.62634
published_at 2026-04-04T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62599
published_at 2026-04-07T12:55:00Z
5
value 0.00432
scoring_system epss
scoring_elements 0.62649
published_at 2026-04-08T12:55:00Z
6
value 0.00432
scoring_system epss
scoring_elements 0.62666
published_at 2026-04-09T12:55:00Z
7
value 0.00432
scoring_system epss
scoring_elements 0.62684
published_at 2026-04-11T12:55:00Z
8
value 0.00432
scoring_system epss
scoring_elements 0.62674
published_at 2026-04-12T12:55:00Z
9
value 0.00432
scoring_system epss
scoring_elements 0.62651
published_at 2026-04-13T12:55:00Z
10
value 0.00432
scoring_system epss
scoring_elements 0.62691
published_at 2026-04-16T12:55:00Z
11
value 0.00432
scoring_system epss
scoring_elements 0.62699
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14597
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865958
reference_id 1865958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865958
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14597
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hwm3-w4vk-q3c7
100
url VCID-jate-mc8k-13gn
vulnerability_id VCID-jate-mc8k-13gn
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14830
reference_id
reference_type
scores
0
value 0.00651
scoring_system epss
scoring_elements 0.70779
published_at 2026-04-01T12:55:00Z
1
value 0.00651
scoring_system epss
scoring_elements 0.70794
published_at 2026-04-02T12:55:00Z
2
value 0.00651
scoring_system epss
scoring_elements 0.7087
published_at 2026-04-21T12:55:00Z
3
value 0.00651
scoring_system epss
scoring_elements 0.70847
published_at 2026-04-09T12:55:00Z
4
value 0.00651
scoring_system epss
scoring_elements 0.70869
published_at 2026-04-11T12:55:00Z
5
value 0.00651
scoring_system epss
scoring_elements 0.70854
published_at 2026-04-12T12:55:00Z
6
value 0.00651
scoring_system epss
scoring_elements 0.70838
published_at 2026-04-13T12:55:00Z
7
value 0.00651
scoring_system epss
scoring_elements 0.70885
published_at 2026-04-16T12:55:00Z
8
value 0.00651
scoring_system epss
scoring_elements 0.70891
published_at 2026-04-18T12:55:00Z
9
value 0.00651
scoring_system epss
scoring_elements 0.70812
published_at 2026-04-04T12:55:00Z
10
value 0.00651
scoring_system epss
scoring_elements 0.70787
published_at 2026-04-07T12:55:00Z
11
value 0.00651
scoring_system epss
scoring_elements 0.70831
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14830
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890762
reference_id 1890762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890762
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:48Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14830
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jate-mc8k-13gn
101
url VCID-jrj5-82ey-3fhy
vulnerability_id VCID-jrj5-82ey-3fhy
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2780.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2780
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.69623
published_at 2026-04-01T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69721
published_at 2026-04-21T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-02T12:55:00Z
3
value 0.00608
scoring_system epss
scoring_elements 0.69651
published_at 2026-04-04T12:55:00Z
4
value 0.00608
scoring_system epss
scoring_elements 0.69629
published_at 2026-04-07T12:55:00Z
5
value 0.00608
scoring_system epss
scoring_elements 0.6968
published_at 2026-04-08T12:55:00Z
6
value 0.00608
scoring_system epss
scoring_elements 0.69697
published_at 2026-04-09T12:55:00Z
7
value 0.00608
scoring_system epss
scoring_elements 0.69719
published_at 2026-04-11T12:55:00Z
8
value 0.00608
scoring_system epss
scoring_elements 0.69705
published_at 2026-04-12T12:55:00Z
9
value 0.00608
scoring_system epss
scoring_elements 0.69691
published_at 2026-04-13T12:55:00Z
10
value 0.00608
scoring_system epss
scoring_elements 0.69731
published_at 2026-04-16T12:55:00Z
11
value 0.00608
scoring_system epss
scoring_elements 0.6974
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2780
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
6
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
7
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830056
reference_id 1830056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830056
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2780
reference_id CVE-2020-2780
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2780
24
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://security.gentoo.org/glsa/202105-27
25
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
26
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
27
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
28
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
29
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
30
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
31
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
32
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
33
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
34
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
35
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
36
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2780
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrj5-82ey-3fhy
102
url VCID-jt7v-kaph-xkfm
vulnerability_id VCID-jt7v-kaph-xkfm
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2901.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2901.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2901
reference_id
reference_type
scores
0
value 0.00423
scoring_system epss
scoring_elements 0.6202
published_at 2026-04-01T12:55:00Z
1
value 0.00423
scoring_system epss
scoring_elements 0.62169
published_at 2026-04-21T12:55:00Z
2
value 0.00423
scoring_system epss
scoring_elements 0.62079
published_at 2026-04-07T12:55:00Z
3
value 0.00423
scoring_system epss
scoring_elements 0.62111
published_at 2026-04-04T12:55:00Z
4
value 0.00423
scoring_system epss
scoring_elements 0.6213
published_at 2026-04-08T12:55:00Z
5
value 0.00423
scoring_system epss
scoring_elements 0.62148
published_at 2026-04-09T12:55:00Z
6
value 0.00423
scoring_system epss
scoring_elements 0.62167
published_at 2026-04-11T12:55:00Z
7
value 0.00423
scoring_system epss
scoring_elements 0.62156
published_at 2026-04-12T12:55:00Z
8
value 0.00423
scoring_system epss
scoring_elements 0.62135
published_at 2026-04-13T12:55:00Z
9
value 0.00423
scoring_system epss
scoring_elements 0.62179
published_at 2026-04-16T12:55:00Z
10
value 0.00423
scoring_system epss
scoring_elements 0.62184
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2901
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830070
reference_id 1830070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830070
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2901
reference_id CVE-2020-2901
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2901
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2901
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jt7v-kaph-xkfm
103
url VCID-k4fk-qkr8-1uac
vulnerability_id VCID-k4fk-qkr8-1uac
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14846
reference_id
reference_type
scores
0
value 0.00651
scoring_system epss
scoring_elements 0.70779
published_at 2026-04-01T12:55:00Z
1
value 0.00651
scoring_system epss
scoring_elements 0.70794
published_at 2026-04-02T12:55:00Z
2
value 0.00651
scoring_system epss
scoring_elements 0.7087
published_at 2026-04-21T12:55:00Z
3
value 0.00651
scoring_system epss
scoring_elements 0.70847
published_at 2026-04-09T12:55:00Z
4
value 0.00651
scoring_system epss
scoring_elements 0.70869
published_at 2026-04-11T12:55:00Z
5
value 0.00651
scoring_system epss
scoring_elements 0.70854
published_at 2026-04-12T12:55:00Z
6
value 0.00651
scoring_system epss
scoring_elements 0.70838
published_at 2026-04-13T12:55:00Z
7
value 0.00651
scoring_system epss
scoring_elements 0.70885
published_at 2026-04-16T12:55:00Z
8
value 0.00651
scoring_system epss
scoring_elements 0.70891
published_at 2026-04-18T12:55:00Z
9
value 0.00651
scoring_system epss
scoring_elements 0.70812
published_at 2026-04-04T12:55:00Z
10
value 0.00651
scoring_system epss
scoring_elements 0.70787
published_at 2026-04-07T12:55:00Z
11
value 0.00651
scoring_system epss
scoring_elements 0.70831
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14846
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890769
reference_id 1890769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890769
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:29Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14846
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4fk-qkr8-1uac
104
url VCID-k5ud-qnrb-5ufj
vulnerability_id VCID-k5ud-qnrb-5ufj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14539.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14539.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14539
reference_id
reference_type
scores
0
value 0.00888
scoring_system epss
scoring_elements 0.75442
published_at 2026-04-01T12:55:00Z
1
value 0.00888
scoring_system epss
scoring_elements 0.75445
published_at 2026-04-02T12:55:00Z
2
value 0.00888
scoring_system epss
scoring_elements 0.75533
published_at 2026-04-21T12:55:00Z
3
value 0.00888
scoring_system epss
scoring_elements 0.75477
published_at 2026-04-04T12:55:00Z
4
value 0.00888
scoring_system epss
scoring_elements 0.75457
published_at 2026-04-07T12:55:00Z
5
value 0.00888
scoring_system epss
scoring_elements 0.75499
published_at 2026-04-08T12:55:00Z
6
value 0.00888
scoring_system epss
scoring_elements 0.75509
published_at 2026-04-09T12:55:00Z
7
value 0.00888
scoring_system epss
scoring_elements 0.75528
published_at 2026-04-11T12:55:00Z
8
value 0.00888
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-12T12:55:00Z
9
value 0.00888
scoring_system epss
scoring_elements 0.75496
published_at 2026-04-13T12:55:00Z
10
value 0.00888
scoring_system epss
scoring_elements 0.75538
published_at 2026-04-16T12:55:00Z
11
value 0.00888
scoring_system epss
scoring_elements 0.75544
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14539
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865945
reference_id 1865945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865945
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14539
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k5ud-qnrb-5ufj
105
url VCID-kjbh-uhvg-b7am
vulnerability_id VCID-kjbh-uhvg-b7am
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2020.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2020
reference_id
reference_type
scores
0
value 0.01766
scoring_system epss
scoring_elements 0.82558
published_at 2026-04-01T12:55:00Z
1
value 0.01766
scoring_system epss
scoring_elements 0.82573
published_at 2026-04-02T12:55:00Z
2
value 0.01766
scoring_system epss
scoring_elements 0.82668
published_at 2026-04-21T12:55:00Z
3
value 0.01766
scoring_system epss
scoring_elements 0.82588
published_at 2026-04-04T12:55:00Z
4
value 0.01766
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-07T12:55:00Z
5
value 0.01766
scoring_system epss
scoring_elements 0.8261
published_at 2026-04-08T12:55:00Z
6
value 0.01766
scoring_system epss
scoring_elements 0.82618
published_at 2026-04-09T12:55:00Z
7
value 0.01766
scoring_system epss
scoring_elements 0.82636
published_at 2026-04-11T12:55:00Z
8
value 0.01766
scoring_system epss
scoring_elements 0.82631
published_at 2026-04-12T12:55:00Z
9
value 0.01766
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-13T12:55:00Z
10
value 0.01766
scoring_system epss
scoring_elements 0.82664
published_at 2026-04-16T12:55:00Z
11
value 0.01766
scoring_system epss
scoring_elements 0.82665
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2020
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922387
reference_id 1922387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922387
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2020
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kjbh-uhvg-b7am
106
url VCID-kwfb-kbpq-pkck
vulnerability_id VCID-kwfb-kbpq-pkck
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2031
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2031
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922393
reference_id 1922393
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922393
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2031
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfb-kbpq-pkck
107
url VCID-m2ey-feyg-ufb7
vulnerability_id VCID-m2ey-feyg-ufb7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2076
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2076
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922407
reference_id 1922407
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922407
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2076
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2ey-feyg-ufb7
108
url VCID-m2x9-xa7p-vbhp
vulnerability_id VCID-m2x9-xa7p-vbhp
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2686.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2686.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2686
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54679
published_at 2026-04-21T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56027
published_at 2026-04-01T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56187
published_at 2026-04-08T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56192
published_at 2026-04-09T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.56202
published_at 2026-04-11T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56178
published_at 2026-04-12T12:55:00Z
6
value 0.00333
scoring_system epss
scoring_elements 0.56163
published_at 2026-04-13T12:55:00Z
7
value 0.00333
scoring_system epss
scoring_elements 0.56196
published_at 2026-04-16T12:55:00Z
8
value 0.00333
scoring_system epss
scoring_elements 0.56198
published_at 2026-04-18T12:55:00Z
9
value 0.00333
scoring_system epss
scoring_elements 0.56136
published_at 2026-04-07T12:55:00Z
10
value 0.00333
scoring_system epss
scoring_elements 0.56156
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2686
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796888
reference_id 1796888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796888
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:51Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:51Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2686
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2x9-xa7p-vbhp
109
url VCID-mg5t-q2uj-4ud1
vulnerability_id VCID-mg5t-q2uj-4ud1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2898.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2898
reference_id
reference_type
scores
0
value 0.00373
scoring_system epss
scoring_elements 0.58931
published_at 2026-04-01T12:55:00Z
1
value 0.00373
scoring_system epss
scoring_elements 0.59074
published_at 2026-04-18T12:55:00Z
2
value 0.00373
scoring_system epss
scoring_elements 0.59007
published_at 2026-04-02T12:55:00Z
3
value 0.00373
scoring_system epss
scoring_elements 0.59029
published_at 2026-04-04T12:55:00Z
4
value 0.00373
scoring_system epss
scoring_elements 0.58995
published_at 2026-04-07T12:55:00Z
5
value 0.00373
scoring_system epss
scoring_elements 0.59046
published_at 2026-04-08T12:55:00Z
6
value 0.00373
scoring_system epss
scoring_elements 0.59053
published_at 2026-04-21T12:55:00Z
7
value 0.00373
scoring_system epss
scoring_elements 0.59071
published_at 2026-04-11T12:55:00Z
8
value 0.00373
scoring_system epss
scoring_elements 0.59035
published_at 2026-04-13T12:55:00Z
9
value 0.00373
scoring_system epss
scoring_elements 0.59069
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2898
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830069
reference_id 1830069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830069
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2898
reference_id CVE-2020-2898
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2898
21
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/
url https://security.gentoo.org/glsa/202105-27
22
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
23
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
24
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
25
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
26
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2898
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mg5t-q2uj-4ud1
110
url VCID-muzn-dqpe-q7cr
vulnerability_id VCID-muzn-dqpe-q7cr
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2180
reference_id
reference_type
scores
0
value 0.04512
scoring_system epss
scoring_elements 0.89091
published_at 2026-04-01T12:55:00Z
1
value 0.04512
scoring_system epss
scoring_elements 0.89099
published_at 2026-04-02T12:55:00Z
2
value 0.04512
scoring_system epss
scoring_elements 0.89154
published_at 2026-04-21T12:55:00Z
3
value 0.04512
scoring_system epss
scoring_elements 0.89113
published_at 2026-04-04T12:55:00Z
4
value 0.04512
scoring_system epss
scoring_elements 0.89116
published_at 2026-04-07T12:55:00Z
5
value 0.04512
scoring_system epss
scoring_elements 0.89134
published_at 2026-04-08T12:55:00Z
6
value 0.04512
scoring_system epss
scoring_elements 0.89139
published_at 2026-04-09T12:55:00Z
7
value 0.04512
scoring_system epss
scoring_elements 0.8915
published_at 2026-04-11T12:55:00Z
8
value 0.04512
scoring_system epss
scoring_elements 0.89146
published_at 2026-04-12T12:55:00Z
9
value 0.04512
scoring_system epss
scoring_elements 0.89144
published_at 2026-04-13T12:55:00Z
10
value 0.04512
scoring_system epss
scoring_elements 0.89157
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2180
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951762
reference_id 1951762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951762
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://security.gentoo.org/glsa/202105-28
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
9
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
10
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
12
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
13
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2180
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-muzn-dqpe-q7cr
111
url VCID-my1q-4m9d-9fgj
vulnerability_id VCID-my1q-4m9d-9fgj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2011
reference_id
reference_type
scores
0
value 0.02144
scoring_system epss
scoring_elements 0.84153
published_at 2026-04-01T12:55:00Z
1
value 0.02144
scoring_system epss
scoring_elements 0.84167
published_at 2026-04-02T12:55:00Z
2
value 0.02144
scoring_system epss
scoring_elements 0.8425
published_at 2026-04-21T12:55:00Z
3
value 0.02144
scoring_system epss
scoring_elements 0.84223
published_at 2026-04-13T12:55:00Z
4
value 0.02144
scoring_system epss
scoring_elements 0.84185
published_at 2026-04-04T12:55:00Z
5
value 0.02144
scoring_system epss
scoring_elements 0.84186
published_at 2026-04-07T12:55:00Z
6
value 0.02144
scoring_system epss
scoring_elements 0.84208
published_at 2026-04-08T12:55:00Z
7
value 0.02144
scoring_system epss
scoring_elements 0.84214
published_at 2026-04-09T12:55:00Z
8
value 0.02144
scoring_system epss
scoring_elements 0.84232
published_at 2026-04-11T12:55:00Z
9
value 0.02144
scoring_system epss
scoring_elements 0.84226
published_at 2026-04-12T12:55:00Z
10
value 0.02144
scoring_system epss
scoring_elements 0.84245
published_at 2026-04-18T12:55:00Z
11
value 0.02144
scoring_system epss
scoring_elements 0.84244
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2011
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922384
reference_id 1922384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922384
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210622-0001/
reference_id ntap-20210622-0001
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/
url https://security.netapp.com/advisory/ntap-20210622-0001/
7
reference_url https://access.redhat.com/errata/RHSA-2019:2327
reference_id RHSA-2019:2327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2327
8
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
9
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
11
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2011
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-my1q-4m9d-9fgj
112
url VCID-n9r2-crxf-jfh7
vulnerability_id VCID-n9r2-crxf-jfh7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2088
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25744
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25815
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25615
published_at 2026-04-21T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25747
published_at 2026-04-09T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25757
published_at 2026-04-11T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25717
published_at 2026-04-12T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25659
published_at 2026-04-13T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25661
published_at 2026-04-16T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25644
published_at 2026-04-18T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25858
published_at 2026-04-04T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25627
published_at 2026-04-07T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.257
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2088
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922410
reference_id 1922410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922410
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2088
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n9r2-crxf-jfh7
113
url VCID-ndhs-j4q8-zkf8
vulnerability_id VCID-ndhs-j4q8-zkf8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14821
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14821
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890758
reference_id 1890758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890758
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:53Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14821
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ndhs-j4q8-zkf8
114
url VCID-ngf5-739w-tbe4
vulnerability_id VCID-ngf5-739w-tbe4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2930.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2930.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2930
reference_id
reference_type
scores
0
value 0.00432
scoring_system epss
scoring_elements 0.62543
published_at 2026-04-01T12:55:00Z
1
value 0.00432
scoring_system epss
scoring_elements 0.62681
published_at 2026-04-21T12:55:00Z
2
value 0.00432
scoring_system epss
scoring_elements 0.62601
published_at 2026-04-02T12:55:00Z
3
value 0.00432
scoring_system epss
scoring_elements 0.62634
published_at 2026-04-04T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62599
published_at 2026-04-07T12:55:00Z
5
value 0.00432
scoring_system epss
scoring_elements 0.62649
published_at 2026-04-08T12:55:00Z
6
value 0.00432
scoring_system epss
scoring_elements 0.62666
published_at 2026-04-09T12:55:00Z
7
value 0.00432
scoring_system epss
scoring_elements 0.62684
published_at 2026-04-11T12:55:00Z
8
value 0.00432
scoring_system epss
scoring_elements 0.62674
published_at 2026-04-12T12:55:00Z
9
value 0.00432
scoring_system epss
scoring_elements 0.62651
published_at 2026-04-13T12:55:00Z
10
value 0.00432
scoring_system epss
scoring_elements 0.62691
published_at 2026-04-16T12:55:00Z
11
value 0.00432
scoring_system epss
scoring_elements 0.62699
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2930
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830079
reference_id 1830079
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830079
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2930
reference_id CVE-2020-2930
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2930
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2930
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngf5-739w-tbe4
115
url VCID-njkb-a6xx-wke9
vulnerability_id VCID-njkb-a6xx-wke9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14845
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14845
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890768
reference_id 1890768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890768
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:31Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14845
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njkb-a6xx-wke9
116
url VCID-nrzc-hfjh-wban
vulnerability_id VCID-nrzc-hfjh-wban
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2762.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2762.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2762
reference_id
reference_type
scores
0
value 0.00373
scoring_system epss
scoring_elements 0.58931
published_at 2026-04-01T12:55:00Z
1
value 0.00373
scoring_system epss
scoring_elements 0.59074
published_at 2026-04-18T12:55:00Z
2
value 0.00373
scoring_system epss
scoring_elements 0.59007
published_at 2026-04-02T12:55:00Z
3
value 0.00373
scoring_system epss
scoring_elements 0.59029
published_at 2026-04-04T12:55:00Z
4
value 0.00373
scoring_system epss
scoring_elements 0.58995
published_at 2026-04-07T12:55:00Z
5
value 0.00373
scoring_system epss
scoring_elements 0.59046
published_at 2026-04-08T12:55:00Z
6
value 0.00373
scoring_system epss
scoring_elements 0.59053
published_at 2026-04-21T12:55:00Z
7
value 0.00373
scoring_system epss
scoring_elements 0.59071
published_at 2026-04-11T12:55:00Z
8
value 0.00373
scoring_system epss
scoring_elements 0.59035
published_at 2026-04-13T12:55:00Z
9
value 0.00373
scoring_system epss
scoring_elements 0.59069
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2762
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830050
reference_id 1830050
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830050
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2762
reference_id CVE-2020-2762
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2762
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2762
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nrzc-hfjh-wban
117
url VCID-p15d-cz1g-hucw
vulnerability_id VCID-p15d-cz1g-hucw
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2056
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2056
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922419
reference_id 1922419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922419
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2056
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p15d-cz1g-hucw
118
url VCID-pawh-67dd-xbay
vulnerability_id VCID-pawh-67dd-xbay
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14868
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14868
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890776
reference_id 1890776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890776
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:10Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14868
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pawh-67dd-xbay
119
url VCID-pfkc-qtn3-skgp
vulnerability_id VCID-pfkc-qtn3-skgp
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14769
reference_id
reference_type
scores
0
value 0.01438
scoring_system epss
scoring_elements 0.80644
published_at 2026-04-01T12:55:00Z
1
value 0.01438
scoring_system epss
scoring_elements 0.80652
published_at 2026-04-02T12:55:00Z
2
value 0.01438
scoring_system epss
scoring_elements 0.80741
published_at 2026-04-21T12:55:00Z
3
value 0.01438
scoring_system epss
scoring_elements 0.80674
published_at 2026-04-04T12:55:00Z
4
value 0.01438
scoring_system epss
scoring_elements 0.8067
published_at 2026-04-07T12:55:00Z
5
value 0.01438
scoring_system epss
scoring_elements 0.80698
published_at 2026-04-08T12:55:00Z
6
value 0.01438
scoring_system epss
scoring_elements 0.80708
published_at 2026-04-09T12:55:00Z
7
value 0.01438
scoring_system epss
scoring_elements 0.80724
published_at 2026-04-11T12:55:00Z
8
value 0.01438
scoring_system epss
scoring_elements 0.80711
published_at 2026-04-12T12:55:00Z
9
value 0.01438
scoring_system epss
scoring_elements 0.80703
published_at 2026-04-13T12:55:00Z
10
value 0.01438
scoring_system epss
scoring_elements 0.80737
published_at 2026-04-16T12:55:00Z
11
value 0.01438
scoring_system epss
scoring_elements 0.80738
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14769
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890739
reference_id 1890739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890739
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14769
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pfkc-qtn3-skgp
120
url VCID-pmhc-1rhq-gfeb
vulnerability_id VCID-pmhc-1rhq-gfeb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14765
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82525
published_at 2026-04-01T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.82539
published_at 2026-04-02T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.82629
published_at 2026-04-21T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-04T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.8255
published_at 2026-04-07T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82576
published_at 2026-04-08T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-09T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82602
published_at 2026-04-11T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-12T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.82589
published_at 2026-04-13T12:55:00Z
10
value 0.01757
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890738
reference_id 1890738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890738
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
12
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
13
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
14
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
17
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
18
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
19
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14765
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb
121
url VCID-ptkb-y547-skg4
vulnerability_id VCID-ptkb-y547-skg4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14860
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40685
published_at 2026-04-01T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40769
published_at 2026-04-02T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40681
published_at 2026-04-21T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40779
published_at 2026-04-09T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40798
published_at 2026-04-11T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40763
published_at 2026-04-12T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40745
published_at 2026-04-13T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40789
published_at 2026-04-16T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40759
published_at 2026-04-18T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40796
published_at 2026-04-04T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40722
published_at 2026-04-07T12:55:00Z
11
value 0.00189
scoring_system epss
scoring_elements 0.40772
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14860
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890772
reference_id 1890772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890772
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:17Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14860
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkb-y547-skg4
122
url VCID-qe1p-f4h5-uyga
vulnerability_id VCID-qe1p-f4h5-uyga
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14812
reference_id
reference_type
scores
0
value 0.01394
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-01T12:55:00Z
1
value 0.01394
scoring_system epss
scoring_elements 0.80338
published_at 2026-04-02T12:55:00Z
2
value 0.01394
scoring_system epss
scoring_elements 0.80417
published_at 2026-04-21T12:55:00Z
3
value 0.01394
scoring_system epss
scoring_elements 0.80358
published_at 2026-04-04T12:55:00Z
4
value 0.01394
scoring_system epss
scoring_elements 0.80347
published_at 2026-04-07T12:55:00Z
5
value 0.01394
scoring_system epss
scoring_elements 0.80376
published_at 2026-04-08T12:55:00Z
6
value 0.01394
scoring_system epss
scoring_elements 0.80386
published_at 2026-04-09T12:55:00Z
7
value 0.01394
scoring_system epss
scoring_elements 0.80405
published_at 2026-04-11T12:55:00Z
8
value 0.01394
scoring_system epss
scoring_elements 0.8039
published_at 2026-04-12T12:55:00Z
9
value 0.01394
scoring_system epss
scoring_elements 0.80383
published_at 2026-04-13T12:55:00Z
10
value 0.01394
scoring_system epss
scoring_elements 0.80412
published_at 2026-04-16T12:55:00Z
11
value 0.01394
scoring_system epss
scoring_elements 0.80413
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890756
reference_id 1890756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890756
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
8
reference_url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
10
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
11
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
12
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
13
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
14
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
15
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
16
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
17
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14812
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga
123
url VCID-qg23-z7ps-73fc
vulnerability_id VCID-qg23-z7ps-73fc
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2779.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2779
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69781
published_at 2026-04-01T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69873
published_at 2026-04-21T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69793
published_at 2026-04-02T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69809
published_at 2026-04-04T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69785
published_at 2026-04-07T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69833
published_at 2026-04-08T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69848
published_at 2026-04-09T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69871
published_at 2026-04-11T12:55:00Z
8
value 0.00613
scoring_system epss
scoring_elements 0.69856
published_at 2026-04-12T12:55:00Z
9
value 0.00613
scoring_system epss
scoring_elements 0.69842
published_at 2026-04-13T12:55:00Z
10
value 0.00613
scoring_system epss
scoring_elements 0.69884
published_at 2026-04-16T12:55:00Z
11
value 0.00613
scoring_system epss
scoring_elements 0.69893
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2779
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830055
reference_id 1830055
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830055
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2779
reference_id CVE-2020-2779
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2779
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
20
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
21
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
22
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2779
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qg23-z7ps-73fc
124
url VCID-qrcr-rtqs-f3g7
vulnerability_id VCID-qrcr-rtqs-f3g7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14794
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14794
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890751
reference_id 1890751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890751
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14794
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qrcr-rtqs-f3g7
125
url VCID-qx9m-18q8-n3cb
vulnerability_id VCID-qx9m-18q8-n3cb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2892.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2892.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2892
reference_id
reference_type
scores
0
value 0.00373
scoring_system epss
scoring_elements 0.58931
published_at 2026-04-01T12:55:00Z
1
value 0.00373
scoring_system epss
scoring_elements 0.59074
published_at 2026-04-18T12:55:00Z
2
value 0.00373
scoring_system epss
scoring_elements 0.59007
published_at 2026-04-02T12:55:00Z
3
value 0.00373
scoring_system epss
scoring_elements 0.59029
published_at 2026-04-04T12:55:00Z
4
value 0.00373
scoring_system epss
scoring_elements 0.58995
published_at 2026-04-07T12:55:00Z
5
value 0.00373
scoring_system epss
scoring_elements 0.59046
published_at 2026-04-08T12:55:00Z
6
value 0.00373
scoring_system epss
scoring_elements 0.59053
published_at 2026-04-21T12:55:00Z
7
value 0.00373
scoring_system epss
scoring_elements 0.59071
published_at 2026-04-11T12:55:00Z
8
value 0.00373
scoring_system epss
scoring_elements 0.59035
published_at 2026-04-13T12:55:00Z
9
value 0.00373
scoring_system epss
scoring_elements 0.59069
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2892
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830062
reference_id 1830062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830062
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2892
reference_id CVE-2020-2892
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2892
21
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/
url https://security.gentoo.org/glsa/202105-27
22
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
23
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
24
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
25
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
26
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2892
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qx9m-18q8-n3cb
126
url VCID-r6xq-en8s-u3db
vulnerability_id VCID-r6xq-en8s-u3db
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14852
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14852
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890771
reference_id 1890771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890771
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:22Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14852
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r6xq-en8s-u3db
127
url VCID-r8yq-ybgw-wkd4
vulnerability_id VCID-r8yq-ybgw-wkd4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14656.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14656
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58672
published_at 2026-04-01T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58755
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58798
published_at 2026-04-21T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58744
published_at 2026-04-07T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-08T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58803
published_at 2026-04-09T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58822
published_at 2026-04-11T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58804
published_at 2026-04-12T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-13T12:55:00Z
9
value 0.00369
scoring_system epss
scoring_elements 0.58816
published_at 2026-04-16T12:55:00Z
10
value 0.00369
scoring_system epss
scoring_elements 0.58821
published_at 2026-04-18T12:55:00Z
11
value 0.00369
scoring_system epss
scoring_elements 0.58777
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14656
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865971
reference_id 1865971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865971
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:24Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:24Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14656
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8yq-ybgw-wkd4
128
url VCID-re6h-anrv-cfg1
vulnerability_id VCID-re6h-anrv-cfg1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2770.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2770.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2770
reference_id
reference_type
scores
0
value 0.00667
scoring_system epss
scoring_elements 0.71199
published_at 2026-04-01T12:55:00Z
1
value 0.00667
scoring_system epss
scoring_elements 0.71279
published_at 2026-04-21T12:55:00Z
2
value 0.00667
scoring_system epss
scoring_elements 0.71208
published_at 2026-04-02T12:55:00Z
3
value 0.00667
scoring_system epss
scoring_elements 0.71226
published_at 2026-04-04T12:55:00Z
4
value 0.00667
scoring_system epss
scoring_elements 0.71201
published_at 2026-04-07T12:55:00Z
5
value 0.00667
scoring_system epss
scoring_elements 0.71243
published_at 2026-04-08T12:55:00Z
6
value 0.00667
scoring_system epss
scoring_elements 0.71257
published_at 2026-04-09T12:55:00Z
7
value 0.00667
scoring_system epss
scoring_elements 0.7128
published_at 2026-04-11T12:55:00Z
8
value 0.00667
scoring_system epss
scoring_elements 0.71265
published_at 2026-04-12T12:55:00Z
9
value 0.00667
scoring_system epss
scoring_elements 0.71249
published_at 2026-04-13T12:55:00Z
10
value 0.00667
scoring_system epss
scoring_elements 0.71295
published_at 2026-04-16T12:55:00Z
11
value 0.00667
scoring_system epss
scoring_elements 0.71301
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2770
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830053
reference_id 1830053
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830053
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2770
reference_id CVE-2020-2770
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2770
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
20
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
21
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
22
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2770
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-re6h-anrv-cfg1
129
url VCID-rf1r-a5xx-akb3
vulnerability_id VCID-rf1r-a5xx-akb3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2022
reference_id
reference_type
scores
0
value 0.0048
scoring_system epss
scoring_elements 0.64986
published_at 2026-04-01T12:55:00Z
1
value 0.0048
scoring_system epss
scoring_elements 0.65036
published_at 2026-04-02T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65098
published_at 2026-04-21T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65064
published_at 2026-04-04T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.65025
published_at 2026-04-07T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65075
published_at 2026-04-08T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65088
published_at 2026-04-09T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65107
published_at 2026-04-11T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65096
published_at 2026-04-12T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65068
published_at 2026-04-13T12:55:00Z
10
value 0.0048
scoring_system epss
scoring_elements 0.65105
published_at 2026-04-16T12:55:00Z
11
value 0.0048
scoring_system epss
scoring_elements 0.65114
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2022
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922389
reference_id 1922389
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922389
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
8
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
9
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
10
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
11
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
12
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
13
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
14
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
16
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2022
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3
130
url VCID-rfdc-qbz3-33as
vulnerability_id VCID-rfdc-qbz3-33as
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14586.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14586
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54167
published_at 2026-04-01T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54187
published_at 2026-04-02T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54273
published_at 2026-04-21T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54217
published_at 2026-04-04T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54193
published_at 2026-04-07T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-08T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.5424
published_at 2026-04-09T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.5429
published_at 2026-04-11T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-12T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.5425
published_at 2026-04-13T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54289
published_at 2026-04-16T12:55:00Z
11
value 0.00311
scoring_system epss
scoring_elements 0.54294
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14586
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865956
reference_id 1865956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865956
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14586
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfdc-qbz3-33as
131
url VCID-rgwn-3dvd-9yd6
vulnerability_id VCID-rgwn-3dvd-9yd6
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2853.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2853
reference_id
reference_type
scores
0
value 0.00667
scoring_system epss
scoring_elements 0.71199
published_at 2026-04-01T12:55:00Z
1
value 0.00667
scoring_system epss
scoring_elements 0.71279
published_at 2026-04-21T12:55:00Z
2
value 0.00667
scoring_system epss
scoring_elements 0.71208
published_at 2026-04-02T12:55:00Z
3
value 0.00667
scoring_system epss
scoring_elements 0.71226
published_at 2026-04-04T12:55:00Z
4
value 0.00667
scoring_system epss
scoring_elements 0.71201
published_at 2026-04-07T12:55:00Z
5
value 0.00667
scoring_system epss
scoring_elements 0.71243
published_at 2026-04-08T12:55:00Z
6
value 0.00667
scoring_system epss
scoring_elements 0.71257
published_at 2026-04-09T12:55:00Z
7
value 0.00667
scoring_system epss
scoring_elements 0.7128
published_at 2026-04-11T12:55:00Z
8
value 0.00667
scoring_system epss
scoring_elements 0.71265
published_at 2026-04-12T12:55:00Z
9
value 0.00667
scoring_system epss
scoring_elements 0.71249
published_at 2026-04-13T12:55:00Z
10
value 0.00667
scoring_system epss
scoring_elements 0.71295
published_at 2026-04-16T12:55:00Z
11
value 0.00667
scoring_system epss
scoring_elements 0.71301
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2853
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830061
reference_id 1830061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830061
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2853
reference_id CVE-2020-2853
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2853
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
20
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
21
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
22
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2853
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgwn-3dvd-9yd6
132
url VCID-ru7n-ys7q-7fc1
vulnerability_id VCID-ru7n-ys7q-7fc1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14678.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14678.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14678
reference_id
reference_type
scores
0
value 0.00681
scoring_system epss
scoring_elements 0.71544
published_at 2026-04-01T12:55:00Z
1
value 0.00681
scoring_system epss
scoring_elements 0.71551
published_at 2026-04-02T12:55:00Z
2
value 0.00681
scoring_system epss
scoring_elements 0.71612
published_at 2026-04-21T12:55:00Z
3
value 0.00681
scoring_system epss
scoring_elements 0.71542
published_at 2026-04-07T12:55:00Z
4
value 0.00681
scoring_system epss
scoring_elements 0.71582
published_at 2026-04-08T12:55:00Z
5
value 0.00681
scoring_system epss
scoring_elements 0.71593
published_at 2026-04-09T12:55:00Z
6
value 0.00681
scoring_system epss
scoring_elements 0.71616
published_at 2026-04-11T12:55:00Z
7
value 0.00681
scoring_system epss
scoring_elements 0.716
published_at 2026-04-12T12:55:00Z
8
value 0.00681
scoring_system epss
scoring_elements 0.71581
published_at 2026-04-13T12:55:00Z
9
value 0.00681
scoring_system epss
scoring_elements 0.71626
published_at 2026-04-16T12:55:00Z
10
value 0.00681
scoring_system epss
scoring_elements 0.71631
published_at 2026-04-18T12:55:00Z
11
value 0.00681
scoring_system epss
scoring_elements 0.71569
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14678
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865973
reference_id 1865973
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865973
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:44Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:44Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14678
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ru7n-ys7q-7fc1
133
url VCID-sbak-359j-afdc
vulnerability_id VCID-sbak-359j-afdc
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2904.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2904.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2904
reference_id
reference_type
scores
0
value 0.00487
scoring_system epss
scoring_elements 0.65324
published_at 2026-04-01T12:55:00Z
1
value 0.00487
scoring_system epss
scoring_elements 0.65436
published_at 2026-04-21T12:55:00Z
2
value 0.00487
scoring_system epss
scoring_elements 0.65373
published_at 2026-04-02T12:55:00Z
3
value 0.00487
scoring_system epss
scoring_elements 0.65398
published_at 2026-04-04T12:55:00Z
4
value 0.00487
scoring_system epss
scoring_elements 0.65363
published_at 2026-04-07T12:55:00Z
5
value 0.00487
scoring_system epss
scoring_elements 0.65416
published_at 2026-04-08T12:55:00Z
6
value 0.00487
scoring_system epss
scoring_elements 0.65427
published_at 2026-04-09T12:55:00Z
7
value 0.00487
scoring_system epss
scoring_elements 0.65445
published_at 2026-04-11T12:55:00Z
8
value 0.00487
scoring_system epss
scoring_elements 0.65431
published_at 2026-04-12T12:55:00Z
9
value 0.00487
scoring_system epss
scoring_elements 0.65404
published_at 2026-04-13T12:55:00Z
10
value 0.00487
scoring_system epss
scoring_elements 0.6544
published_at 2026-04-16T12:55:00Z
11
value 0.00487
scoring_system epss
scoring_elements 0.65451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2904
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830072
reference_id 1830072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830072
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2904
reference_id CVE-2020-2904
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2904
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2904
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sbak-359j-afdc
134
url VCID-sddw-fre1-53dt
vulnerability_id VCID-sddw-fre1-53dt
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2679.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2679.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2679
reference_id
reference_type
scores
0
value 0.00394
scoring_system epss
scoring_elements 0.60359
published_at 2026-04-21T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61541
published_at 2026-04-01T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61664
published_at 2026-04-08T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61679
published_at 2026-04-09T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.617
published_at 2026-04-11T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61689
published_at 2026-04-12T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.61669
published_at 2026-04-13T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61711
published_at 2026-04-16T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61716
published_at 2026-04-18T12:55:00Z
9
value 0.00415
scoring_system epss
scoring_elements 0.61615
published_at 2026-04-02T12:55:00Z
10
value 0.00415
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-04T12:55:00Z
11
value 0.00415
scoring_system epss
scoring_elements 0.61616
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2679
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796887
reference_id 1796887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796887
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:02Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:02Z/
url https://usn.ubuntu.com/4250-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2679
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sddw-fre1-53dt
135
url VCID-sq21-9e5z-muhb
vulnerability_id VCID-sq21-9e5z-muhb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2042
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27967
published_at 2026-04-01T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.28039
published_at 2026-04-02T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27832
published_at 2026-04-21T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27983
published_at 2026-04-09T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27986
published_at 2026-04-11T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27944
published_at 2026-04-12T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27885
published_at 2026-04-13T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27894
published_at 2026-04-16T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27875
published_at 2026-04-18T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.28081
published_at 2026-04-04T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27876
published_at 2026-04-07T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27942
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2042
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922397
reference_id 1922397
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922397
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 2.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2042
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sq21-9e5z-muhb
136
url VCID-sruz-agx3-3feq
vulnerability_id VCID-sruz-agx3-3feq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14878
reference_id
reference_type
scores
0
value 0.00897
scoring_system epss
scoring_elements 0.75569
published_at 2026-04-01T12:55:00Z
1
value 0.00897
scoring_system epss
scoring_elements 0.75571
published_at 2026-04-02T12:55:00Z
2
value 0.00897
scoring_system epss
scoring_elements 0.75652
published_at 2026-04-21T12:55:00Z
3
value 0.00897
scoring_system epss
scoring_elements 0.75615
published_at 2026-04-08T12:55:00Z
4
value 0.00897
scoring_system epss
scoring_elements 0.75626
published_at 2026-04-13T12:55:00Z
5
value 0.00897
scoring_system epss
scoring_elements 0.7565
published_at 2026-04-11T12:55:00Z
6
value 0.00897
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-12T12:55:00Z
7
value 0.00897
scoring_system epss
scoring_elements 0.75663
published_at 2026-04-16T12:55:00Z
8
value 0.00897
scoring_system epss
scoring_elements 0.75667
published_at 2026-04-18T12:55:00Z
9
value 0.00897
scoring_system epss
scoring_elements 0.75601
published_at 2026-04-04T12:55:00Z
10
value 0.00897
scoring_system epss
scoring_elements 0.75581
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14878
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890780
reference_id 1890780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890780
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:53:51Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14878
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sruz-agx3-3feq
137
url VCID-sutj-xqjr-puee
vulnerability_id VCID-sutj-xqjr-puee
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2814.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2814.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2814
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.3169
published_at 2026-04-21T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.3184
published_at 2026-04-02T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31709
published_at 2026-04-01T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31884
published_at 2026-04-04T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31703
published_at 2026-04-07T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31755
published_at 2026-04-08T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31785
published_at 2026-04-09T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31788
published_at 2026-04-11T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31748
published_at 2026-04-12T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31713
published_at 2026-04-13T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31744
published_at 2026-04-16T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.31722
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2814
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
8
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
9
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830060
reference_id 1830060
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830060
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2814
reference_id CVE-2020-2814
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2814
26
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://security.gentoo.org/glsa/202012-08
27
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/
url https://security.gentoo.org/glsa/202105-27
28
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
29
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
30
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
31
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
32
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
33
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
34
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
35
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
36
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
37
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
38
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2814
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sutj-xqjr-puee
138
url VCID-swdu-cgp2-77e4
vulnerability_id VCID-swdu-cgp2-77e4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14870
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14870
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890778
reference_id 1890778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890778
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:07Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14870
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-swdu-cgp2-77e4
139
url VCID-t31g-7742-fqhk
vulnerability_id VCID-t31g-7742-fqhk
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14786
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14786
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890746
reference_id 1890746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890746
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14786
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t31g-7742-fqhk
140
url VCID-td7w-db1k-t3g3
vulnerability_id VCID-td7w-db1k-t3g3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2072
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2072
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922406
reference_id 1922406
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922406
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2072
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-td7w-db1k-t3g3
141
url VCID-teu1-w449-fkcx
vulnerability_id VCID-teu1-w449-fkcx
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2065
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2065
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922404
reference_id 1922404
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922404
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2065
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-teu1-w449-fkcx
142
url VCID-tmkk-qvgc-43c2
vulnerability_id VCID-tmkk-qvgc-43c2
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2761.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2761
reference_id
reference_type
scores
0
value 0.00667
scoring_system epss
scoring_elements 0.71199
published_at 2026-04-01T12:55:00Z
1
value 0.00667
scoring_system epss
scoring_elements 0.71279
published_at 2026-04-21T12:55:00Z
2
value 0.00667
scoring_system epss
scoring_elements 0.71208
published_at 2026-04-02T12:55:00Z
3
value 0.00667
scoring_system epss
scoring_elements 0.71226
published_at 2026-04-04T12:55:00Z
4
value 0.00667
scoring_system epss
scoring_elements 0.71201
published_at 2026-04-07T12:55:00Z
5
value 0.00667
scoring_system epss
scoring_elements 0.71243
published_at 2026-04-08T12:55:00Z
6
value 0.00667
scoring_system epss
scoring_elements 0.71257
published_at 2026-04-09T12:55:00Z
7
value 0.00667
scoring_system epss
scoring_elements 0.7128
published_at 2026-04-11T12:55:00Z
8
value 0.00667
scoring_system epss
scoring_elements 0.71265
published_at 2026-04-12T12:55:00Z
9
value 0.00667
scoring_system epss
scoring_elements 0.71249
published_at 2026-04-13T12:55:00Z
10
value 0.00667
scoring_system epss
scoring_elements 0.71295
published_at 2026-04-16T12:55:00Z
11
value 0.00667
scoring_system epss
scoring_elements 0.71301
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2761
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830049
reference_id 1830049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830049
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2761
reference_id CVE-2020-2761
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2761
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
20
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
21
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
22
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2761
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmkk-qvgc-43c2
143
url VCID-tp8f-vv6a-j7fb
vulnerability_id VCID-tp8f-vv6a-j7fb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2752.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2752.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2752
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45795
published_at 2026-04-18T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45663
published_at 2026-04-01T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45728
published_at 2026-04-02T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45748
published_at 2026-04-04T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45697
published_at 2026-04-07T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45753
published_at 2026-04-08T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.4575
published_at 2026-04-13T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45772
published_at 2026-04-11T12:55:00Z
8
value 0.00229
scoring_system epss
scoring_elements 0.45742
published_at 2026-04-21T12:55:00Z
9
value 0.00229
scoring_system epss
scoring_elements 0.458
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2752
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1835849
reference_id 1835849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1835849
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2752
reference_id CVE-2020-2752
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2752
19
reference_url https://security.gentoo.org/glsa/202012-08
reference_id GLSA-202012-08
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://security.gentoo.org/glsa/202012-08
20
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/
url https://security.gentoo.org/glsa/202105-27
21
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
22
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
23
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
24
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
25
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
26
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
27
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
28
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
29
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
30
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
31
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
32
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
33
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
34
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
35
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
36
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2752
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tp8f-vv6a-j7fb
144
url VCID-tudj-guxj-53ea
vulnerability_id VCID-tudj-guxj-53ea
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2024
reference_id
reference_type
scores
0
value 0.00637
scoring_system epss
scoring_elements 0.7041
published_at 2026-04-01T12:55:00Z
1
value 0.00637
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-02T12:55:00Z
2
value 0.00637
scoring_system epss
scoring_elements 0.70505
published_at 2026-04-21T12:55:00Z
3
value 0.00637
scoring_system epss
scoring_elements 0.7048
published_at 2026-04-09T12:55:00Z
4
value 0.00637
scoring_system epss
scoring_elements 0.70504
published_at 2026-04-11T12:55:00Z
5
value 0.00637
scoring_system epss
scoring_elements 0.70489
published_at 2026-04-12T12:55:00Z
6
value 0.00637
scoring_system epss
scoring_elements 0.70475
published_at 2026-04-13T12:55:00Z
7
value 0.00637
scoring_system epss
scoring_elements 0.70517
published_at 2026-04-16T12:55:00Z
8
value 0.00637
scoring_system epss
scoring_elements 0.70525
published_at 2026-04-18T12:55:00Z
9
value 0.00637
scoring_system epss
scoring_elements 0.70441
published_at 2026-04-04T12:55:00Z
10
value 0.00637
scoring_system epss
scoring_elements 0.70419
published_at 2026-04-07T12:55:00Z
11
value 0.00637
scoring_system epss
scoring_elements 0.70465
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2024
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922390
reference_id 1922390
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922390
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2024
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tudj-guxj-53ea
145
url VCID-tv36-3tsk-uket
vulnerability_id VCID-tv36-3tsk-uket
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14891
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14891
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890782
reference_id 1890782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890782
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:53Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14891
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tv36-3tsk-uket
146
url VCID-u2pz-1zwj-zye3
vulnerability_id VCID-u2pz-1zwj-zye3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2925.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2925
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53285
published_at 2026-04-01T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.53392
published_at 2026-04-21T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53308
published_at 2026-04-02T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53334
published_at 2026-04-04T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53303
published_at 2026-04-07T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53356
published_at 2026-04-08T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.5335
published_at 2026-04-09T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53402
published_at 2026-04-11T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.53385
published_at 2026-04-12T12:55:00Z
9
value 0.003
scoring_system epss
scoring_elements 0.53369
published_at 2026-04-13T12:55:00Z
10
value 0.003
scoring_system epss
scoring_elements 0.53406
published_at 2026-04-16T12:55:00Z
11
value 0.003
scoring_system epss
scoring_elements 0.53412
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2925
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830076
reference_id 1830076
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830076
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2925
reference_id CVE-2020-2925
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2925
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2925
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u2pz-1zwj-zye3
147
url VCID-u33b-3n5s-4qfv
vulnerability_id VCID-u33b-3n5s-4qfv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2875.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2875
reference_id
reference_type
scores
0
value 0.0069
scoring_system epss
scoring_elements 0.71745
published_at 2026-04-01T12:55:00Z
1
value 0.0069
scoring_system epss
scoring_elements 0.71816
published_at 2026-04-21T12:55:00Z
2
value 0.0069
scoring_system epss
scoring_elements 0.71753
published_at 2026-04-02T12:55:00Z
3
value 0.0069
scoring_system epss
scoring_elements 0.71771
published_at 2026-04-04T12:55:00Z
4
value 0.0069
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-07T12:55:00Z
5
value 0.0069
scoring_system epss
scoring_elements 0.71785
published_at 2026-04-13T12:55:00Z
6
value 0.0069
scoring_system epss
scoring_elements 0.71796
published_at 2026-04-09T12:55:00Z
7
value 0.0069
scoring_system epss
scoring_elements 0.7182
published_at 2026-04-11T12:55:00Z
8
value 0.0069
scoring_system epss
scoring_elements 0.71803
published_at 2026-04-12T12:55:00Z
9
value 0.0069
scoring_system epss
scoring_elements 0.71828
published_at 2026-04-16T12:55:00Z
10
value 0.0069
scoring_system epss
scoring_elements 0.71833
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2875
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
9
reference_url https://www.debian.org/security/2020/dsa-4703
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://www.debian.org/security/2020/dsa-4703
10
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851019
reference_id 1851019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851019
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2875
reference_id CVE-2020-2875
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2875
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
20
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
21
reference_url https://access.redhat.com/errata/RHSA-2021:5134
reference_id RHSA-2021:5134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5134
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2875
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u33b-3n5s-4qfv
148
url VCID-u7pr-ex15-uyhv
vulnerability_id VCID-u7pr-ex15-uyhv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2923.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2923
reference_id
reference_type
scores
0
value 0.00487
scoring_system epss
scoring_elements 0.65324
published_at 2026-04-01T12:55:00Z
1
value 0.00487
scoring_system epss
scoring_elements 0.65436
published_at 2026-04-21T12:55:00Z
2
value 0.00487
scoring_system epss
scoring_elements 0.65373
published_at 2026-04-02T12:55:00Z
3
value 0.00487
scoring_system epss
scoring_elements 0.65398
published_at 2026-04-04T12:55:00Z
4
value 0.00487
scoring_system epss
scoring_elements 0.65363
published_at 2026-04-07T12:55:00Z
5
value 0.00487
scoring_system epss
scoring_elements 0.65416
published_at 2026-04-08T12:55:00Z
6
value 0.00487
scoring_system epss
scoring_elements 0.65427
published_at 2026-04-09T12:55:00Z
7
value 0.00487
scoring_system epss
scoring_elements 0.65445
published_at 2026-04-11T12:55:00Z
8
value 0.00487
scoring_system epss
scoring_elements 0.65431
published_at 2026-04-12T12:55:00Z
9
value 0.00487
scoring_system epss
scoring_elements 0.65404
published_at 2026-04-13T12:55:00Z
10
value 0.00487
scoring_system epss
scoring_elements 0.6544
published_at 2026-04-16T12:55:00Z
11
value 0.00487
scoring_system epss
scoring_elements 0.65451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2923
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830074
reference_id 1830074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830074
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2923
reference_id CVE-2020-2923
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2923
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2923
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u7pr-ex15-uyhv
149
url VCID-ucu7-scqc-nkcc
vulnerability_id VCID-ucu7-scqc-nkcc
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2933.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2933
reference_id
reference_type
scores
0
value 0.00732
scoring_system epss
scoring_elements 0.72642
published_at 2026-04-01T12:55:00Z
1
value 0.00732
scoring_system epss
scoring_elements 0.72739
published_at 2026-04-21T12:55:00Z
2
value 0.00732
scoring_system epss
scoring_elements 0.7265
published_at 2026-04-02T12:55:00Z
3
value 0.00732
scoring_system epss
scoring_elements 0.72667
published_at 2026-04-04T12:55:00Z
4
value 0.00732
scoring_system epss
scoring_elements 0.72645
published_at 2026-04-07T12:55:00Z
5
value 0.00732
scoring_system epss
scoring_elements 0.72684
published_at 2026-04-08T12:55:00Z
6
value 0.00732
scoring_system epss
scoring_elements 0.72697
published_at 2026-04-09T12:55:00Z
7
value 0.00732
scoring_system epss
scoring_elements 0.72721
published_at 2026-04-11T12:55:00Z
8
value 0.00732
scoring_system epss
scoring_elements 0.72704
published_at 2026-04-12T12:55:00Z
9
value 0.00732
scoring_system epss
scoring_elements 0.72694
published_at 2026-04-13T12:55:00Z
10
value 0.00732
scoring_system epss
scoring_elements 0.72736
published_at 2026-04-16T12:55:00Z
11
value 0.00732
scoring_system epss
scoring_elements 0.72747
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/
9
reference_url https://www.debian.org/security/2020/dsa-4703
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://www.debian.org/security/2020/dsa-4703
10
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851022
reference_id 1851022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851022
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\/j:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2933
reference_id CVE-2020-2933
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
2
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2933
18
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/
url https://security.gentoo.org/glsa/202105-27
19
reference_url https://access.redhat.com/errata/RHSA-2020:4960
reference_id RHSA-2020:4960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4960
20
reference_url https://access.redhat.com/errata/RHSA-2020:4961
reference_id RHSA-2020:4961
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4961
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2933
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucu7-scqc-nkcc
150
url VCID-upmt-kdja-37fj
vulnerability_id VCID-upmt-kdja-37fj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2938.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2938.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2938
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24863
published_at 2026-04-21T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24952
published_at 2026-04-01T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-02T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.2507
published_at 2026-04-04T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24845
published_at 2026-04-07T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24913
published_at 2026-04-08T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24959
published_at 2026-04-09T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24974
published_at 2026-04-11T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24934
published_at 2026-04-12T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24879
published_at 2026-04-13T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24893
published_at 2026-04-16T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24886
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2938
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/
7
reference_url https://security.netapp.com/advisory/ntap-20191017-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://security.netapp.com/advisory/ntap-20191017-0002/
8
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1764680
reference_id 1764680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1764680
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2938
reference_id CVE-2019-2938
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2938
26
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://security.gentoo.org/glsa/202105-27
27
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
28
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
29
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
30
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
31
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
32
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
33
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
34
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
35
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
36
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
37
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
38
reference_url https://usn.ubuntu.com/4195-1/
reference_id USN-4195-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://usn.ubuntu.com/4195-1/
39
reference_url https://usn.ubuntu.com/4195-2/
reference_id USN-4195-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/
url https://usn.ubuntu.com/4195-2/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2019-2938
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upmt-kdja-37fj
151
url VCID-uzvh-tvvx-vyer
vulnerability_id VCID-uzvh-tvvx-vyer
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2081
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2081
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922416
reference_id 1922416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922416
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2081
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzvh-tvvx-vyer
152
url VCID-v543-uhu7-afay
vulnerability_id VCID-v543-uhu7-afay
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2014.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2014.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2014
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2014
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922385
reference_id 1922385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922385
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:35Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:35Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
5
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2014
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v543-uhu7-afay
153
url VCID-v7cn-tz6z-53hw
vulnerability_id VCID-v7cn-tz6z-53hw
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2806.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2806
reference_id
reference_type
scores
0
value 0.00471
scoring_system epss
scoring_elements 0.64507
published_at 2026-04-01T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64622
published_at 2026-04-21T12:55:00Z
2
value 0.00471
scoring_system epss
scoring_elements 0.64561
published_at 2026-04-02T12:55:00Z
3
value 0.00471
scoring_system epss
scoring_elements 0.64589
published_at 2026-04-13T12:55:00Z
4
value 0.00471
scoring_system epss
scoring_elements 0.64547
published_at 2026-04-07T12:55:00Z
5
value 0.00471
scoring_system epss
scoring_elements 0.64596
published_at 2026-04-08T12:55:00Z
6
value 0.00471
scoring_system epss
scoring_elements 0.64612
published_at 2026-04-09T12:55:00Z
7
value 0.00471
scoring_system epss
scoring_elements 0.6463
published_at 2026-04-11T12:55:00Z
8
value 0.00471
scoring_system epss
scoring_elements 0.64617
published_at 2026-04-12T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.64624
published_at 2026-04-16T12:55:00Z
10
value 0.00471
scoring_system epss
scoring_elements 0.64636
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2806
2
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:13Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
3
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:13Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830081
reference_id 1830081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830081
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2806
reference_id CVE-2020-2806
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2806
12
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:13Z/
url https://security.gentoo.org/glsa/202105-27
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2806
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v7cn-tz6z-53hw
154
url VCID-vap7-ycjn-73d1
vulnerability_id VCID-vap7-ycjn-73d1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14793
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74705
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-07T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74783
published_at 2026-04-21T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.74735
published_at 2026-04-04T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74741
published_at 2026-04-08T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74756
published_at 2026-04-09T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74779
published_at 2026-04-11T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-12T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74749
published_at 2026-04-13T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74785
published_at 2026-04-16T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74793
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14793
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890750
reference_id 1890750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890750
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14793
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vap7-ycjn-73d1
155
url VCID-vcyx-58nm-gbba
vulnerability_id VCID-vcyx-58nm-gbba
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2007
reference_id
reference_type
scores
0
value 0.00531
scoring_system epss
scoring_elements 0.67187
published_at 2026-04-01T12:55:00Z
1
value 0.00531
scoring_system epss
scoring_elements 0.67224
published_at 2026-04-02T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.67287
published_at 2026-04-21T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.6726
published_at 2026-04-13T12:55:00Z
4
value 0.00531
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-04T12:55:00Z
5
value 0.00531
scoring_system epss
scoring_elements 0.67225
published_at 2026-04-07T12:55:00Z
6
value 0.00531
scoring_system epss
scoring_elements 0.67276
published_at 2026-04-08T12:55:00Z
7
value 0.00531
scoring_system epss
scoring_elements 0.67289
published_at 2026-04-09T12:55:00Z
8
value 0.00531
scoring_system epss
scoring_elements 0.67309
published_at 2026-04-11T12:55:00Z
9
value 0.00531
scoring_system epss
scoring_elements 0.67296
published_at 2026-04-12T12:55:00Z
10
value 0.00531
scoring_system epss
scoring_elements 0.67308
published_at 2026-04-18T12:55:00Z
11
value 0.00531
scoring_system epss
scoring_elements 0.67295
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2007
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922382
reference_id 1922382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922382
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210622-0001/
reference_id ntap-20210622-0001
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://security.netapp.com/advisory/ntap-20210622-0001/
6
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3708
7
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
8
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
9
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
10
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
11
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
12
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
13
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
14
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
15
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
16
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
17
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2007
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcyx-58nm-gbba
156
url VCID-vddh-dtqh-bqay
vulnerability_id VCID-vddh-dtqh-bqay
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2897.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2897.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2897
reference_id
reference_type
scores
0
value 0.00487
scoring_system epss
scoring_elements 0.65324
published_at 2026-04-01T12:55:00Z
1
value 0.00487
scoring_system epss
scoring_elements 0.65436
published_at 2026-04-21T12:55:00Z
2
value 0.00487
scoring_system epss
scoring_elements 0.65373
published_at 2026-04-02T12:55:00Z
3
value 0.00487
scoring_system epss
scoring_elements 0.65398
published_at 2026-04-04T12:55:00Z
4
value 0.00487
scoring_system epss
scoring_elements 0.65363
published_at 2026-04-07T12:55:00Z
5
value 0.00487
scoring_system epss
scoring_elements 0.65416
published_at 2026-04-08T12:55:00Z
6
value 0.00487
scoring_system epss
scoring_elements 0.65427
published_at 2026-04-09T12:55:00Z
7
value 0.00487
scoring_system epss
scoring_elements 0.65445
published_at 2026-04-11T12:55:00Z
8
value 0.00487
scoring_system epss
scoring_elements 0.65431
published_at 2026-04-12T12:55:00Z
9
value 0.00487
scoring_system epss
scoring_elements 0.65404
published_at 2026-04-13T12:55:00Z
10
value 0.00487
scoring_system epss
scoring_elements 0.6544
published_at 2026-04-16T12:55:00Z
11
value 0.00487
scoring_system epss
scoring_elements 0.65451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2897
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830068
reference_id 1830068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830068
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2897
reference_id CVE-2020-2897
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2897
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2897
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vddh-dtqh-bqay
157
url VCID-vket-6cdn-e7bx
vulnerability_id VCID-vket-6cdn-e7bx
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2924.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2924
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53285
published_at 2026-04-01T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.53392
published_at 2026-04-21T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53308
published_at 2026-04-02T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53334
published_at 2026-04-04T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53303
published_at 2026-04-07T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53356
published_at 2026-04-08T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.5335
published_at 2026-04-09T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53402
published_at 2026-04-11T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.53385
published_at 2026-04-12T12:55:00Z
9
value 0.003
scoring_system epss
scoring_elements 0.53369
published_at 2026-04-13T12:55:00Z
10
value 0.003
scoring_system epss
scoring_elements 0.53406
published_at 2026-04-16T12:55:00Z
11
value 0.003
scoring_system epss
scoring_elements 0.53412
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2924
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830075
reference_id 1830075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830075
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2924
reference_id CVE-2020-2924
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2924
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2924
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vket-6cdn-e7bx
158
url VCID-vxuu-tf8e-bkcz
vulnerability_id VCID-vxuu-tf8e-bkcz
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2903.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2903.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2903
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53285
published_at 2026-04-01T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.53392
published_at 2026-04-21T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53308
published_at 2026-04-02T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53334
published_at 2026-04-04T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53303
published_at 2026-04-07T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53356
published_at 2026-04-08T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.5335
published_at 2026-04-09T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53402
published_at 2026-04-11T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.53385
published_at 2026-04-12T12:55:00Z
9
value 0.003
scoring_system epss
scoring_elements 0.53369
published_at 2026-04-13T12:55:00Z
10
value 0.003
scoring_system epss
scoring_elements 0.53406
published_at 2026-04-16T12:55:00Z
11
value 0.003
scoring_system epss
scoring_elements 0.53412
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2903
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830071
reference_id 1830071
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830071
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2903
reference_id CVE-2020-2903
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2903
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2903
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vxuu-tf8e-bkcz
159
url VCID-w93s-7t77-x3fg
vulnerability_id VCID-w93s-7t77-x3fg
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2010
reference_id
reference_type
scores
0
value 0.00364
scoring_system epss
scoring_elements 0.58354
published_at 2026-04-01T12:55:00Z
1
value 0.00364
scoring_system epss
scoring_elements 0.58439
published_at 2026-04-02T12:55:00Z
2
value 0.00364
scoring_system epss
scoring_elements 0.58483
published_at 2026-04-21T12:55:00Z
3
value 0.00364
scoring_system epss
scoring_elements 0.58458
published_at 2026-04-04T12:55:00Z
4
value 0.00364
scoring_system epss
scoring_elements 0.58432
published_at 2026-04-07T12:55:00Z
5
value 0.00364
scoring_system epss
scoring_elements 0.58485
published_at 2026-04-08T12:55:00Z
6
value 0.00364
scoring_system epss
scoring_elements 0.58491
published_at 2026-04-09T12:55:00Z
7
value 0.00364
scoring_system epss
scoring_elements 0.58508
published_at 2026-04-11T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.58488
published_at 2026-04-12T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58469
published_at 2026-04-13T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-16T12:55:00Z
11
value 0.00364
scoring_system epss
scoring_elements 0.58505
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2010
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922383
reference_id 1922383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922383
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210622-0001/
reference_id ntap-20210622-0001
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/
url https://security.netapp.com/advisory/ntap-20210622-0001/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
10
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2010
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w93s-7t77-x3fg
160
url VCID-wfqc-j2nq-x7bw
vulnerability_id VCID-wfqc-j2nq-x7bw
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2926.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2926
reference_id
reference_type
scores
0
value 0.00237
scoring_system epss
scoring_elements 0.46782
published_at 2026-04-01T12:55:00Z
1
value 0.00237
scoring_system epss
scoring_elements 0.46845
published_at 2026-04-21T12:55:00Z
2
value 0.00237
scoring_system epss
scoring_elements 0.4682
published_at 2026-04-02T12:55:00Z
3
value 0.00237
scoring_system epss
scoring_elements 0.46839
published_at 2026-04-04T12:55:00Z
4
value 0.00237
scoring_system epss
scoring_elements 0.46788
published_at 2026-04-07T12:55:00Z
5
value 0.00237
scoring_system epss
scoring_elements 0.46843
published_at 2026-04-08T12:55:00Z
6
value 0.00237
scoring_system epss
scoring_elements 0.46842
published_at 2026-04-09T12:55:00Z
7
value 0.00237
scoring_system epss
scoring_elements 0.46865
published_at 2026-04-11T12:55:00Z
8
value 0.00237
scoring_system epss
scoring_elements 0.46837
published_at 2026-04-12T12:55:00Z
9
value 0.00237
scoring_system epss
scoring_elements 0.46844
published_at 2026-04-13T12:55:00Z
10
value 0.00237
scoring_system epss
scoring_elements 0.469
published_at 2026-04-16T12:55:00Z
11
value 0.00237
scoring_system epss
scoring_elements 0.46897
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2926
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830077
reference_id 1830077
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830077
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2926
reference_id CVE-2020-2926
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2926
13
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/
url https://security.gentoo.org/glsa/202105-27
14
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
15
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
16
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
17
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
18
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2926
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfqc-j2nq-x7bw
161
url VCID-wt8v-67w9-7ugx
vulnerability_id VCID-wt8v-67w9-7ugx
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14633.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14633
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45851
published_at 2026-04-01T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45899
published_at 2026-04-02T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45916
published_at 2026-04-21T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45869
published_at 2026-04-07T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45925
published_at 2026-04-08T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.45922
published_at 2026-04-09T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.45945
published_at 2026-04-11T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45915
published_at 2026-04-12T12:55:00Z
8
value 0.00231
scoring_system epss
scoring_elements 0.45923
published_at 2026-04-13T12:55:00Z
9
value 0.00231
scoring_system epss
scoring_elements 0.45975
published_at 2026-04-16T12:55:00Z
10
value 0.00231
scoring_system epss
scoring_elements 0.4597
published_at 2026-04-18T12:55:00Z
11
value 0.00231
scoring_system epss
scoring_elements 0.45919
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14633
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865966
reference_id 1865966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865966
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:54Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:54Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14633
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wt8v-67w9-7ugx
162
url VCID-wvw3-eeya-auee
vulnerability_id VCID-wvw3-eeya-auee
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14567.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14567
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61784
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61858
published_at 2026-04-02T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61942
published_at 2026-04-21T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61924
published_at 2026-04-09T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61945
published_at 2026-04-11T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61934
published_at 2026-04-12T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61913
published_at 2026-04-13T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61957
published_at 2026-04-16T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61961
published_at 2026-04-18T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61888
published_at 2026-04-04T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61859
published_at 2026-04-07T12:55:00Z
11
value 0.00419
scoring_system epss
scoring_elements 0.61908
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14567
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865952
reference_id 1865952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865952
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:09Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14567
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wvw3-eeya-auee
163
url VCID-wvxn-ugew-u7bj
vulnerability_id VCID-wvxn-ugew-u7bj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2166
reference_id
reference_type
scores
0
value 0.01154
scoring_system epss
scoring_elements 0.78469
published_at 2026-04-01T12:55:00Z
1
value 0.01154
scoring_system epss
scoring_elements 0.78545
published_at 2026-04-21T12:55:00Z
2
value 0.01154
scoring_system epss
scoring_elements 0.78475
published_at 2026-04-02T12:55:00Z
3
value 0.01154
scoring_system epss
scoring_elements 0.78506
published_at 2026-04-04T12:55:00Z
4
value 0.01154
scoring_system epss
scoring_elements 0.78489
published_at 2026-04-07T12:55:00Z
5
value 0.01154
scoring_system epss
scoring_elements 0.78516
published_at 2026-04-08T12:55:00Z
6
value 0.01154
scoring_system epss
scoring_elements 0.78522
published_at 2026-04-09T12:55:00Z
7
value 0.01154
scoring_system epss
scoring_elements 0.78547
published_at 2026-04-11T12:55:00Z
8
value 0.01154
scoring_system epss
scoring_elements 0.78529
published_at 2026-04-12T12:55:00Z
9
value 0.01154
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-13T12:55:00Z
10
value 0.01154
scoring_system epss
scoring_elements 0.78549
published_at 2026-04-16T12:55:00Z
11
value 0.01154
scoring_system epss
scoring_elements 0.78548
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951755
reference_id 1951755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951755
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
reference_id 988428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
8
reference_url https://security.archlinux.org/ASA-202105-14
reference_id ASA-202105-14
reference_type
scores
url https://security.archlinux.org/ASA-202105-14
9
reference_url https://security.archlinux.org/AVG-1882
reference_id AVG-1882
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1882
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
reference_id DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
reference_id GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
12
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://security.gentoo.org/glsa/202105-27
13
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://security.gentoo.org/glsa/202105-28
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
reference_id PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
19
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
20
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
21
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
22
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
23
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
25
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
26
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2166
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj
164
url VCID-wwy8-j3q8-8khu
vulnerability_id VCID-wwy8-j3q8-8khu
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14623.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14623
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.61541
published_at 2026-04-01T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61615
published_at 2026-04-02T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61699
published_at 2026-04-21T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61616
published_at 2026-04-07T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61664
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61679
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.617
published_at 2026-04-11T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61689
published_at 2026-04-12T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61669
published_at 2026-04-13T12:55:00Z
9
value 0.00415
scoring_system epss
scoring_elements 0.61711
published_at 2026-04-16T12:55:00Z
10
value 0.00415
scoring_system epss
scoring_elements 0.61716
published_at 2026-04-18T12:55:00Z
11
value 0.00415
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14623
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865962
reference_id 1865962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865962
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:05Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:05Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14623
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwy8-j3q8-8khu
165
url VCID-wxvs-dchq-uudr
vulnerability_id VCID-wxvs-dchq-uudr
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14632.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14632
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.61541
published_at 2026-04-01T12:55:00Z
1
value 0.00415
scoring_system epss
scoring_elements 0.61615
published_at 2026-04-02T12:55:00Z
2
value 0.00415
scoring_system epss
scoring_elements 0.61699
published_at 2026-04-21T12:55:00Z
3
value 0.00415
scoring_system epss
scoring_elements 0.61616
published_at 2026-04-07T12:55:00Z
4
value 0.00415
scoring_system epss
scoring_elements 0.61664
published_at 2026-04-08T12:55:00Z
5
value 0.00415
scoring_system epss
scoring_elements 0.61679
published_at 2026-04-09T12:55:00Z
6
value 0.00415
scoring_system epss
scoring_elements 0.617
published_at 2026-04-11T12:55:00Z
7
value 0.00415
scoring_system epss
scoring_elements 0.61689
published_at 2026-04-12T12:55:00Z
8
value 0.00415
scoring_system epss
scoring_elements 0.61669
published_at 2026-04-13T12:55:00Z
9
value 0.00415
scoring_system epss
scoring_elements 0.61711
published_at 2026-04-16T12:55:00Z
10
value 0.00415
scoring_system epss
scoring_elements 0.61716
published_at 2026-04-18T12:55:00Z
11
value 0.00415
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14632
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865965
reference_id 1865965
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865965
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:55Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:55Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14632
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxvs-dchq-uudr
166
url VCID-xhh7-myxk-xkah
vulnerability_id VCID-xhh7-myxk-xkah
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14631.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14631
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58672
published_at 2026-04-01T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58755
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58798
published_at 2026-04-21T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58744
published_at 2026-04-07T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-08T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58803
published_at 2026-04-09T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58822
published_at 2026-04-11T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58804
published_at 2026-04-12T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-13T12:55:00Z
9
value 0.00369
scoring_system epss
scoring_elements 0.58816
published_at 2026-04-16T12:55:00Z
10
value 0.00369
scoring_system epss
scoring_elements 0.58821
published_at 2026-04-18T12:55:00Z
11
value 0.00369
scoring_system epss
scoring_elements 0.58777
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14631
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865964
reference_id 1865964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865964
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:57Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:57Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14631
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhh7-myxk-xkah
167
url VCID-xj3s-qduu-2qbh
vulnerability_id VCID-xj3s-qduu-2qbh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14697.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14697.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14697
reference_id
reference_type
scores
0
value 0.00789
scoring_system epss
scoring_elements 0.73818
published_at 2026-04-01T12:55:00Z
1
value 0.00789
scoring_system epss
scoring_elements 0.73827
published_at 2026-04-02T12:55:00Z
2
value 0.00789
scoring_system epss
scoring_elements 0.73915
published_at 2026-04-18T12:55:00Z
3
value 0.00789
scoring_system epss
scoring_elements 0.73851
published_at 2026-04-04T12:55:00Z
4
value 0.00789
scoring_system epss
scoring_elements 0.73822
published_at 2026-04-07T12:55:00Z
5
value 0.00789
scoring_system epss
scoring_elements 0.73857
published_at 2026-04-08T12:55:00Z
6
value 0.00789
scoring_system epss
scoring_elements 0.73869
published_at 2026-04-09T12:55:00Z
7
value 0.00789
scoring_system epss
scoring_elements 0.73891
published_at 2026-04-11T12:55:00Z
8
value 0.00789
scoring_system epss
scoring_elements 0.73873
published_at 2026-04-12T12:55:00Z
9
value 0.00789
scoring_system epss
scoring_elements 0.73865
published_at 2026-04-13T12:55:00Z
10
value 0.00789
scoring_system epss
scoring_elements 0.73907
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14697
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865975
reference_id 1865975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865975
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:28Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
5
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
6
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
7
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
8
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:28Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14697
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xj3s-qduu-2qbh
168
url VCID-xtxe-6myn-ske5
vulnerability_id VCID-xtxe-6myn-ske5
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2765.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2765
reference_id
reference_type
scores
0
value 0.00373
scoring_system epss
scoring_elements 0.58931
published_at 2026-04-01T12:55:00Z
1
value 0.00373
scoring_system epss
scoring_elements 0.59074
published_at 2026-04-18T12:55:00Z
2
value 0.00373
scoring_system epss
scoring_elements 0.59007
published_at 2026-04-02T12:55:00Z
3
value 0.00373
scoring_system epss
scoring_elements 0.59029
published_at 2026-04-04T12:55:00Z
4
value 0.00373
scoring_system epss
scoring_elements 0.58995
published_at 2026-04-07T12:55:00Z
5
value 0.00373
scoring_system epss
scoring_elements 0.59046
published_at 2026-04-08T12:55:00Z
6
value 0.00373
scoring_system epss
scoring_elements 0.59053
published_at 2026-04-21T12:55:00Z
7
value 0.00373
scoring_system epss
scoring_elements 0.59071
published_at 2026-04-11T12:55:00Z
8
value 0.00373
scoring_system epss
scoring_elements 0.59035
published_at 2026-04-13T12:55:00Z
9
value 0.00373
scoring_system epss
scoring_elements 0.59069
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2765
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830052
reference_id 1830052
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830052
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2765
reference_id CVE-2020-2765
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2765
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2765
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xtxe-6myn-ske5
169
url VCID-xzx5-52qt-ffcj
vulnerability_id VCID-xzx5-52qt-ffcj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2019.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2019.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2019
reference_id
reference_type
scores
0
value 0.00281
scoring_system epss
scoring_elements 0.51354
published_at 2026-04-01T12:55:00Z
1
value 0.00281
scoring_system epss
scoring_elements 0.51404
published_at 2026-04-02T12:55:00Z
2
value 0.00281
scoring_system epss
scoring_elements 0.51478
published_at 2026-04-21T12:55:00Z
3
value 0.00281
scoring_system epss
scoring_elements 0.51431
published_at 2026-04-04T12:55:00Z
4
value 0.00281
scoring_system epss
scoring_elements 0.5139
published_at 2026-04-07T12:55:00Z
5
value 0.00281
scoring_system epss
scoring_elements 0.51443
published_at 2026-04-08T12:55:00Z
6
value 0.00281
scoring_system epss
scoring_elements 0.51441
published_at 2026-04-09T12:55:00Z
7
value 0.00281
scoring_system epss
scoring_elements 0.51483
published_at 2026-04-11T12:55:00Z
8
value 0.00281
scoring_system epss
scoring_elements 0.51462
published_at 2026-04-12T12:55:00Z
9
value 0.00281
scoring_system epss
scoring_elements 0.5145
published_at 2026-04-13T12:55:00Z
10
value 0.00281
scoring_system epss
scoring_elements 0.51492
published_at 2026-04-16T12:55:00Z
11
value 0.00281
scoring_system epss
scoring_elements 0.515
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2019
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922386
reference_id 1922386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922386
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2019
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzx5-52qt-ffcj
170
url VCID-y2wt-18ad-uyas
vulnerability_id VCID-y2wt-18ad-uyas
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2768
reference_id
reference_type
scores
0
value 0.0041
scoring_system epss
scoring_elements 0.6121
published_at 2026-04-01T12:55:00Z
1
value 0.0041
scoring_system epss
scoring_elements 0.61287
published_at 2026-04-07T12:55:00Z
2
value 0.0041
scoring_system epss
scoring_elements 0.61335
published_at 2026-04-08T12:55:00Z
3
value 0.0041
scoring_system epss
scoring_elements 0.6135
published_at 2026-04-09T12:55:00Z
4
value 0.0041
scoring_system epss
scoring_elements 0.6137
published_at 2026-04-11T12:55:00Z
5
value 0.0041
scoring_system epss
scoring_elements 0.61356
published_at 2026-04-12T12:55:00Z
6
value 0.0041
scoring_system epss
scoring_elements 0.61337
published_at 2026-04-13T12:55:00Z
7
value 0.0041
scoring_system epss
scoring_elements 0.61376
published_at 2026-04-16T12:55:00Z
8
value 0.0041
scoring_system epss
scoring_elements 0.6138
published_at 2026-04-18T12:55:00Z
9
value 0.0041
scoring_system epss
scoring_elements 0.6136
published_at 2026-04-21T12:55:00Z
10
value 0.0041
scoring_system epss
scoring_elements 0.6129
published_at 2026-04-02T12:55:00Z
11
value 0.0041
scoring_system epss
scoring_elements 0.61319
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2768
1
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:49Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:49Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2768
reference_id CVE-2020-2768
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:P
1
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
2
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2768
10
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:49Z/
url https://security.gentoo.org/glsa/202105-27
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2768
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2wt-18ad-uyas
171
url VCID-yavu-9dss-j7hk
vulnerability_id VCID-yavu-9dss-j7hk
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2763.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2763.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2763
reference_id
reference_type
scores
0
value 0.00423
scoring_system epss
scoring_elements 0.6202
published_at 2026-04-01T12:55:00Z
1
value 0.00423
scoring_system epss
scoring_elements 0.62169
published_at 2026-04-21T12:55:00Z
2
value 0.00423
scoring_system epss
scoring_elements 0.62079
published_at 2026-04-07T12:55:00Z
3
value 0.00423
scoring_system epss
scoring_elements 0.62111
published_at 2026-04-04T12:55:00Z
4
value 0.00423
scoring_system epss
scoring_elements 0.6213
published_at 2026-04-08T12:55:00Z
5
value 0.00423
scoring_system epss
scoring_elements 0.62148
published_at 2026-04-09T12:55:00Z
6
value 0.00423
scoring_system epss
scoring_elements 0.62167
published_at 2026-04-11T12:55:00Z
7
value 0.00423
scoring_system epss
scoring_elements 0.62156
published_at 2026-04-12T12:55:00Z
8
value 0.00423
scoring_system epss
scoring_elements 0.62135
published_at 2026-04-13T12:55:00Z
9
value 0.00423
scoring_system epss
scoring_elements 0.62179
published_at 2026-04-16T12:55:00Z
10
value 0.00423
scoring_system epss
scoring_elements 0.62184
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2763
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/
5
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1830051
reference_id 1830051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1830051
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2763
reference_id CVE-2020-2763
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
2
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2763
22
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/
url https://security.gentoo.org/glsa/202105-27
23
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
24
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
25
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
26
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
27
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2763
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yavu-9dss-j7hk
172
url VCID-yf77-atgx-dyh3
vulnerability_id VCID-yf77-atgx-dyh3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14888
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14888
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890781
reference_id 1890781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890781
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:56Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14888
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yf77-atgx-dyh3
173
url VCID-yt4u-3atp-vfb1
vulnerability_id VCID-yt4u-3atp-vfb1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2574.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2574
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.37051
published_at 2026-04-02T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36881
published_at 2026-04-01T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.37084
published_at 2026-04-04T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36912
published_at 2026-04-07T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36962
published_at 2026-04-08T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36975
published_at 2026-04-09T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36984
published_at 2026-04-11T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36948
published_at 2026-04-12T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36922
published_at 2026-04-13T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36967
published_at 2026-04-16T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36951
published_at 2026-04-18T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36892
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2574
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2020/09/29/1
reference_id 1
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url http://www.openwall.com/lists/oss-security/2020/09/29/1
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1798587
reference_id 1798587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1798587
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html
7
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
8
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
9
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
10
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
11
reference_url https://access.redhat.com/errata/RHSA-2020:4026
reference_id RHSA-2020:4026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4026
12
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
13
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
14
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
15
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
16
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
17
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
18
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
19
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
20
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
21
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
22
reference_url https://usn.ubuntu.com/4250-1/
reference_id USN-4250-1
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url https://usn.ubuntu.com/4250-1/
23
reference_url https://usn.ubuntu.com/4250-2/
reference_id USN-4250-2
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/
url https://usn.ubuntu.com/4250-2/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-2574
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yt4u-3atp-vfb1
174
url VCID-z56k-yk6c-hudp
vulnerability_id VCID-z56k-yk6c-hudp
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2006.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2006
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78127
published_at 2026-04-01T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78136
published_at 2026-04-02T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.7821
published_at 2026-04-21T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78166
published_at 2026-04-04T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78148
published_at 2026-04-07T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78174
published_at 2026-04-08T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-09T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78206
published_at 2026-04-11T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78189
published_at 2026-04-12T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78185
published_at 2026-04-13T12:55:00Z
10
value 0.01115
scoring_system epss
scoring_elements 0.78217
published_at 2026-04-16T12:55:00Z
11
value 0.01115
scoring_system epss
scoring_elements 0.78215
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2006
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922381
reference_id 1922381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922381
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210622-0001/
reference_id ntap-20210622-0001
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/
url https://security.netapp.com/advisory/ntap-20210622-0001/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2006
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z56k-yk6c-hudp
175
url VCID-z7zv-zgw7-n3fj
vulnerability_id VCID-z7zv-zgw7-n3fj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2058
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2058
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922401
reference_id 1922401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922401
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2058
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7zv-zgw7-n3fj
176
url VCID-za2p-vsg7-dudh
vulnerability_id VCID-za2p-vsg7-dudh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14568.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14568
reference_id
reference_type
scores
0
value 0.00436
scoring_system epss
scoring_elements 0.6291
published_at 2026-04-01T12:55:00Z
1
value 0.00436
scoring_system epss
scoring_elements 0.62968
published_at 2026-04-02T12:55:00Z
2
value 0.00436
scoring_system epss
scoring_elements 0.63032
published_at 2026-04-21T12:55:00Z
3
value 0.00436
scoring_system epss
scoring_elements 0.62997
published_at 2026-04-04T12:55:00Z
4
value 0.00436
scoring_system epss
scoring_elements 0.62961
published_at 2026-04-07T12:55:00Z
5
value 0.00436
scoring_system epss
scoring_elements 0.63012
published_at 2026-04-08T12:55:00Z
6
value 0.00436
scoring_system epss
scoring_elements 0.63028
published_at 2026-04-09T12:55:00Z
7
value 0.00436
scoring_system epss
scoring_elements 0.63046
published_at 2026-04-16T12:55:00Z
8
value 0.00436
scoring_system epss
scoring_elements 0.63031
published_at 2026-04-12T12:55:00Z
9
value 0.00436
scoring_system epss
scoring_elements 0.63009
published_at 2026-04-13T12:55:00Z
10
value 0.00436
scoring_system epss
scoring_elements 0.63053
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14568
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1865953
reference_id 1865953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1865953
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
reference_id CAI7GRYZ5265JVKHC6VXI57MNJDDB63C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
reference_id HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
reference_id SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/
11
reference_url https://usn.ubuntu.com/4441-1/
reference_id USN-4441-1
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/
url https://usn.ubuntu.com/4441-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14568
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-za2p-vsg7-dudh
177
url VCID-zjes-mkae-que3
vulnerability_id VCID-zjes-mkae-que3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2009.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2009.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2009
reference_id
reference_type
scores
0
value 0.00199
scoring_system epss
scoring_elements 0.41974
published_at 2026-04-01T12:55:00Z
1
value 0.00199
scoring_system epss
scoring_elements 0.42035
published_at 2026-04-02T12:55:00Z
2
value 0.00199
scoring_system epss
scoring_elements 0.41978
published_at 2026-04-21T12:55:00Z
3
value 0.00199
scoring_system epss
scoring_elements 0.42063
published_at 2026-04-04T12:55:00Z
4
value 0.00199
scoring_system epss
scoring_elements 0.42001
published_at 2026-04-07T12:55:00Z
5
value 0.00199
scoring_system epss
scoring_elements 0.42053
published_at 2026-04-08T12:55:00Z
6
value 0.00199
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-09T12:55:00Z
7
value 0.00199
scoring_system epss
scoring_elements 0.42086
published_at 2026-04-11T12:55:00Z
8
value 0.00199
scoring_system epss
scoring_elements 0.42049
published_at 2026-04-12T12:55:00Z
9
value 0.00199
scoring_system epss
scoring_elements 0.42024
published_at 2026-04-13T12:55:00Z
10
value 0.00199
scoring_system epss
scoring_elements 0.42074
published_at 2026-04-16T12:55:00Z
11
value 0.00199
scoring_system epss
scoring_elements 0.42048
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2009
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922424
reference_id 1922424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922424
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
7
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
8
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
9
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2021-2009
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjes-mkae-que3
178
url VCID-zjsy-ax8b-ckd9
vulnerability_id VCID-zjsy-ax8b-ckd9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14626
reference_id
reference_type
scores
0
value 0.02221
scoring_system epss
scoring_elements 0.84519
published_at 2026-04-21T12:55:00Z
1
value 0.02221
scoring_system epss
scoring_elements 0.84425
published_at 2026-04-01T12:55:00Z
2
value 0.02221
scoring_system epss
scoring_elements 0.8444
published_at 2026-04-02T12:55:00Z
3
value 0.02221
scoring_system epss
scoring_elements 0.84506
published_at 2026-04-11T12:55:00Z
4
value 0.02221
scoring_system epss
scoring_elements 0.845
published_at 2026-04-12T12:55:00Z
5
value 0.02221
scoring_system epss
scoring_elements 0.84496
published_at 2026-04-13T12:55:00Z
6
value 0.02221
scoring_system epss
scoring_elements 0.84517
published_at 2026-04-18T12:55:00Z
7
value 0.02221
scoring_system epss
scoring_elements 0.84459
published_at 2026-04-04T12:55:00Z
8
value 0.02221
scoring_system epss
scoring_elements 0.84461
published_at 2026-04-07T12:55:00Z
9
value 0.02221
scoring_system epss
scoring_elements 0.84482
published_at 2026-04-08T12:55:00Z
10
value 0.02221
scoring_system epss
scoring_elements 0.84488
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14626
1
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:58Z/
url https://security.gentoo.org/glsa/202105-27
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14626
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjsy-ax8b-ckd9
179
url VCID-zn55-b12v-5fax
vulnerability_id VCID-zn55-b12v-5fax
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14873
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14873
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890779
reference_id 1890779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890779
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:06Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:ebuild/dev-db/mysql-connector-c@5.7.34
purl pkg:ebuild/dev-db/mysql-connector-c@5.7.34
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34
1
url pkg:ebuild/dev-db/mysql-connector-c@8.0.24
purl pkg:ebuild/dev-db/mysql-connector-c@8.0.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@8.0.24
aliases CVE-2020-14873
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn55-b12v-5fax
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql-connector-c@5.7.34