Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
Typedeb
Namespacedebian
Namemysql-8.0
Version8.0.22-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.0.23-1
Latest_non_vulnerable_version8.0.46-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-11tt-44je-dfg8
vulnerability_id VCID-11tt-44je-dfg8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14775
reference_id
reference_type
scores
0
value 0.01438
scoring_system epss
scoring_elements 0.80644
published_at 2026-04-01T12:55:00Z
1
value 0.01438
scoring_system epss
scoring_elements 0.80652
published_at 2026-04-02T12:55:00Z
2
value 0.01438
scoring_system epss
scoring_elements 0.80741
published_at 2026-04-21T12:55:00Z
3
value 0.01438
scoring_system epss
scoring_elements 0.80674
published_at 2026-04-04T12:55:00Z
4
value 0.01438
scoring_system epss
scoring_elements 0.8067
published_at 2026-04-07T12:55:00Z
5
value 0.01438
scoring_system epss
scoring_elements 0.80698
published_at 2026-04-08T12:55:00Z
6
value 0.01438
scoring_system epss
scoring_elements 0.80708
published_at 2026-04-09T12:55:00Z
7
value 0.01438
scoring_system epss
scoring_elements 0.80724
published_at 2026-04-11T12:55:00Z
8
value 0.01438
scoring_system epss
scoring_elements 0.80711
published_at 2026-04-12T12:55:00Z
9
value 0.01438
scoring_system epss
scoring_elements 0.80703
published_at 2026-04-13T12:55:00Z
10
value 0.01438
scoring_system epss
scoring_elements 0.80737
published_at 2026-04-16T12:55:00Z
11
value 0.01438
scoring_system epss
scoring_elements 0.80738
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14775
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890784
reference_id 1890784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890784
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14775
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-11tt-44je-dfg8
1
url VCID-187q-sxxu-zyh5
vulnerability_id VCID-187q-sxxu-zyh5
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14836
reference_id
reference_type
scores
0
value 0.00637
scoring_system epss
scoring_elements 0.7041
published_at 2026-04-01T12:55:00Z
1
value 0.00637
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-02T12:55:00Z
2
value 0.00637
scoring_system epss
scoring_elements 0.70505
published_at 2026-04-21T12:55:00Z
3
value 0.00637
scoring_system epss
scoring_elements 0.7048
published_at 2026-04-09T12:55:00Z
4
value 0.00637
scoring_system epss
scoring_elements 0.70504
published_at 2026-04-11T12:55:00Z
5
value 0.00637
scoring_system epss
scoring_elements 0.70489
published_at 2026-04-12T12:55:00Z
6
value 0.00637
scoring_system epss
scoring_elements 0.70475
published_at 2026-04-13T12:55:00Z
7
value 0.00637
scoring_system epss
scoring_elements 0.70517
published_at 2026-04-16T12:55:00Z
8
value 0.00637
scoring_system epss
scoring_elements 0.70525
published_at 2026-04-18T12:55:00Z
9
value 0.00637
scoring_system epss
scoring_elements 0.70441
published_at 2026-04-04T12:55:00Z
10
value 0.00637
scoring_system epss
scoring_elements 0.70419
published_at 2026-04-07T12:55:00Z
11
value 0.00637
scoring_system epss
scoring_elements 0.70465
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14836
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890763
reference_id 1890763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890763
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:40Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14836
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-187q-sxxu-zyh5
2
url VCID-1vkz-z2pq-nbat
vulnerability_id VCID-1vkz-z2pq-nbat
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14861
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14861
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890773
reference_id 1890773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890773
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:15Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14861
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vkz-z2pq-nbat
3
url VCID-1vm5-s57q-5fh7
vulnerability_id VCID-1vm5-s57q-5fh7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14800
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.5534
published_at 2026-04-01T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55452
published_at 2026-04-02T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55498
published_at 2026-04-21T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55507
published_at 2026-04-09T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55516
published_at 2026-04-11T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55495
published_at 2026-04-12T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55479
published_at 2026-04-13T12:55:00Z
7
value 0.00324
scoring_system epss
scoring_elements 0.55515
published_at 2026-04-16T12:55:00Z
8
value 0.00324
scoring_system epss
scoring_elements 0.55519
published_at 2026-04-18T12:55:00Z
9
value 0.00324
scoring_system epss
scoring_elements 0.55476
published_at 2026-04-04T12:55:00Z
10
value 0.00324
scoring_system epss
scoring_elements 0.55454
published_at 2026-04-07T12:55:00Z
11
value 0.00324
scoring_system epss
scoring_elements 0.55506
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14800
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890753
reference_id 1890753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890753
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:14Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14800
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vm5-s57q-5fh7
4
url VCID-26c7-8j5m-pygt
vulnerability_id VCID-26c7-8j5m-pygt
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14804
reference_id
reference_type
scores
0
value 0.00372
scoring_system epss
scoring_elements 0.58885
published_at 2026-04-01T12:55:00Z
1
value 0.00372
scoring_system epss
scoring_elements 0.5896
published_at 2026-04-02T12:55:00Z
2
value 0.00372
scoring_system epss
scoring_elements 0.59027
published_at 2026-04-18T12:55:00Z
3
value 0.00372
scoring_system epss
scoring_elements 0.59
published_at 2026-04-08T12:55:00Z
4
value 0.00372
scoring_system epss
scoring_elements 0.59006
published_at 2026-04-09T12:55:00Z
5
value 0.00372
scoring_system epss
scoring_elements 0.59026
published_at 2026-04-11T12:55:00Z
6
value 0.00372
scoring_system epss
scoring_elements 0.59007
published_at 2026-04-21T12:55:00Z
7
value 0.00372
scoring_system epss
scoring_elements 0.58989
published_at 2026-04-13T12:55:00Z
8
value 0.00372
scoring_system epss
scoring_elements 0.59023
published_at 2026-04-16T12:55:00Z
9
value 0.00372
scoring_system epss
scoring_elements 0.58982
published_at 2026-04-04T12:55:00Z
10
value 0.00372
scoring_system epss
scoring_elements 0.58948
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14804
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890754
reference_id 1890754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890754
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:09Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14804
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26c7-8j5m-pygt
5
url VCID-2sfw-7k8u-1fbk
vulnerability_id VCID-2sfw-7k8u-1fbk
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14827
reference_id
reference_type
scores
0
value 0.00455
scoring_system epss
scoring_elements 0.63748
published_at 2026-04-01T12:55:00Z
1
value 0.00455
scoring_system epss
scoring_elements 0.63809
published_at 2026-04-02T12:55:00Z
2
value 0.00455
scoring_system epss
scoring_elements 0.63872
published_at 2026-04-18T12:55:00Z
3
value 0.00455
scoring_system epss
scoring_elements 0.63863
published_at 2026-04-16T12:55:00Z
4
value 0.00455
scoring_system epss
scoring_elements 0.63827
published_at 2026-04-13T12:55:00Z
5
value 0.00455
scoring_system epss
scoring_elements 0.63844
published_at 2026-04-08T12:55:00Z
6
value 0.00455
scoring_system epss
scoring_elements 0.63861
published_at 2026-04-21T12:55:00Z
7
value 0.00455
scoring_system epss
scoring_elements 0.63875
published_at 2026-04-11T12:55:00Z
8
value 0.00455
scoring_system epss
scoring_elements 0.63835
published_at 2026-04-04T12:55:00Z
9
value 0.00455
scoring_system epss
scoring_elements 0.63793
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14827
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890759
reference_id 1890759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890759
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:50Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14827
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2sfw-7k8u-1fbk
6
url VCID-2ytu-hw3r-ffc8
vulnerability_id VCID-2ytu-hw3r-ffc8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14814
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14814
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890757
reference_id 1890757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890757
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:00Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14814
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytu-hw3r-ffc8
7
url VCID-2zv1-9c2g-fkdq
vulnerability_id VCID-2zv1-9c2g-fkdq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14893
reference_id
reference_type
scores
0
value 0.00292
scoring_system epss
scoring_elements 0.52483
published_at 2026-04-01T12:55:00Z
1
value 0.00292
scoring_system epss
scoring_elements 0.5253
published_at 2026-04-02T12:55:00Z
2
value 0.00292
scoring_system epss
scoring_elements 0.52635
published_at 2026-04-18T12:55:00Z
3
value 0.00292
scoring_system epss
scoring_elements 0.52575
published_at 2026-04-08T12:55:00Z
4
value 0.00292
scoring_system epss
scoring_elements 0.52569
published_at 2026-04-09T12:55:00Z
5
value 0.00292
scoring_system epss
scoring_elements 0.5262
published_at 2026-04-21T12:55:00Z
6
value 0.00292
scoring_system epss
scoring_elements 0.52603
published_at 2026-04-12T12:55:00Z
7
value 0.00292
scoring_system epss
scoring_elements 0.52588
published_at 2026-04-13T12:55:00Z
8
value 0.00292
scoring_system epss
scoring_elements 0.52628
published_at 2026-04-16T12:55:00Z
9
value 0.00292
scoring_system epss
scoring_elements 0.52556
published_at 2026-04-04T12:55:00Z
10
value 0.00292
scoring_system epss
scoring_elements 0.52523
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14893
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890783
reference_id 1890783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890783
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:50Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14893
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zv1-9c2g-fkdq
8
url VCID-3k3d-296j-kycn
vulnerability_id VCID-3k3d-296j-kycn
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2055
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2055
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922400
reference_id 1922400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922400
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2055
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3k3d-296j-kycn
9
url VCID-4msq-13an-d7cb
vulnerability_id VCID-4msq-13an-d7cb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14789
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76541
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76546
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-21T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76574
published_at 2026-04-04T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.76555
published_at 2026-04-07T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76587
published_at 2026-04-08T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-09T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-11T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76604
published_at 2026-04-12T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-13T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-16T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.7664
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890747
reference_id 1890747
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890747
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
11
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
12
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
13
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14789
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb
10
url VCID-4qvq-j6yh-ckbf
vulnerability_id VCID-4qvq-j6yh-ckbf
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14866
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14866
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890774
reference_id 1890774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890774
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:13Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14866
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-j6yh-ckbf
11
url VCID-5sgr-q6mn-u7gq
vulnerability_id VCID-5sgr-q6mn-u7gq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14776
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76541
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76546
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-21T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76574
published_at 2026-04-04T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.76555
published_at 2026-04-07T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76587
published_at 2026-04-08T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-09T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-11T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76604
published_at 2026-04-12T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-13T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-16T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.7664
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890743
reference_id 1890743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890743
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
11
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
12
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
13
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14776
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq
12
url VCID-5ug6-v7ru-j3bv
vulnerability_id VCID-5ug6-v7ru-j3bv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14790
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74705
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-07T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74783
published_at 2026-04-21T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.74735
published_at 2026-04-04T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74741
published_at 2026-04-08T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74756
published_at 2026-04-09T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74779
published_at 2026-04-11T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-12T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74749
published_at 2026-04-13T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74785
published_at 2026-04-16T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74793
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14790
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890748
reference_id 1890748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890748
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14790
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ug6-v7ru-j3bv
13
url VCID-6grs-76qf-jqhf
vulnerability_id VCID-6grs-76qf-jqhf
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14785
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14785
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890745
reference_id 1890745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890745
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14785
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6grs-76qf-jqhf
14
url VCID-6w26-6psj-zubm
vulnerability_id VCID-6w26-6psj-zubm
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14809
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14809
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890755
reference_id 1890755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890755
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:05Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14809
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6w26-6psj-zubm
15
url VCID-6z2t-rt9t-wydy
vulnerability_id VCID-6z2t-rt9t-wydy
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14828
reference_id
reference_type
scores
0
value 0.00942
scoring_system epss
scoring_elements 0.76219
published_at 2026-04-01T12:55:00Z
1
value 0.00942
scoring_system epss
scoring_elements 0.76223
published_at 2026-04-02T12:55:00Z
2
value 0.00942
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-21T12:55:00Z
3
value 0.00942
scoring_system epss
scoring_elements 0.7628
published_at 2026-04-09T12:55:00Z
4
value 0.00942
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-11T12:55:00Z
5
value 0.00942
scoring_system epss
scoring_elements 0.76284
published_at 2026-04-12T12:55:00Z
6
value 0.00942
scoring_system epss
scoring_elements 0.76279
published_at 2026-04-13T12:55:00Z
7
value 0.00942
scoring_system epss
scoring_elements 0.7632
published_at 2026-04-16T12:55:00Z
8
value 0.00942
scoring_system epss
scoring_elements 0.76325
published_at 2026-04-18T12:55:00Z
9
value 0.00942
scoring_system epss
scoring_elements 0.76254
published_at 2026-04-04T12:55:00Z
10
value 0.00942
scoring_system epss
scoring_elements 0.76234
published_at 2026-04-07T12:55:00Z
11
value 0.00942
scoring_system epss
scoring_elements 0.76266
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14828
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890760
reference_id 1890760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890760
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:02Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14828
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6z2t-rt9t-wydy
16
url VCID-71bd-rm5x-cud8
vulnerability_id VCID-71bd-rm5x-cud8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14848
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14848
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890770
reference_id 1890770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890770
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:27Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14848
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71bd-rm5x-cud8
17
url VCID-7jj8-tenv-zub1
vulnerability_id VCID-7jj8-tenv-zub1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14837
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14837
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890764
reference_id 1890764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890764
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:39Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14837
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jj8-tenv-zub1
18
url VCID-9nry-61xw-cug4
vulnerability_id VCID-9nry-61xw-cug4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14869
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14869
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890777
reference_id 1890777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890777
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:09Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14869
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nry-61xw-cug4
19
url VCID-9ycb-mjma-7qfv
vulnerability_id VCID-9ycb-mjma-7qfv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14839
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14839
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890766
reference_id 1890766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890766
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:37Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14839
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ycb-mjma-7qfv
20
url VCID-aaq9-6yhn-afbx
vulnerability_id VCID-aaq9-6yhn-afbx
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14777
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14777
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890744
reference_id 1890744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890744
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14777
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aaq9-6yhn-afbx
21
url VCID-aczd-32sa-fffg
vulnerability_id VCID-aczd-32sa-fffg
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14829
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14829
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890761
reference_id 1890761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890761
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:49Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14829
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aczd-32sa-fffg
22
url VCID-c6rw-mujf-qqbj
vulnerability_id VCID-c6rw-mujf-qqbj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2030
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2030
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922392
reference_id 1922392
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922392
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2030
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6rw-mujf-qqbj
23
url VCID-cr9r-v269-7qan
vulnerability_id VCID-cr9r-v269-7qan
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14867
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14867
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890775
reference_id 1890775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890775
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:11Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14867
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr9r-v269-7qan
24
url VCID-d5hc-4qz5-3uag
vulnerability_id VCID-d5hc-4qz5-3uag
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14672
reference_id
reference_type
scores
0
value 0.01097
scoring_system epss
scoring_elements 0.77954
published_at 2026-04-01T12:55:00Z
1
value 0.01097
scoring_system epss
scoring_elements 0.77961
published_at 2026-04-02T12:55:00Z
2
value 0.01097
scoring_system epss
scoring_elements 0.78038
published_at 2026-04-21T12:55:00Z
3
value 0.01097
scoring_system epss
scoring_elements 0.7799
published_at 2026-04-04T12:55:00Z
4
value 0.01097
scoring_system epss
scoring_elements 0.77971
published_at 2026-04-07T12:55:00Z
5
value 0.01097
scoring_system epss
scoring_elements 0.77998
published_at 2026-04-08T12:55:00Z
6
value 0.01097
scoring_system epss
scoring_elements 0.78002
published_at 2026-04-09T12:55:00Z
7
value 0.01097
scoring_system epss
scoring_elements 0.78029
published_at 2026-04-11T12:55:00Z
8
value 0.01097
scoring_system epss
scoring_elements 0.78012
published_at 2026-04-12T12:55:00Z
9
value 0.01097
scoring_system epss
scoring_elements 0.78011
published_at 2026-04-13T12:55:00Z
10
value 0.01097
scoring_system epss
scoring_elements 0.78046
published_at 2026-04-16T12:55:00Z
11
value 0.01097
scoring_system epss
scoring_elements 0.78045
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14672
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890737
reference_id 1890737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890737
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14672
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d5hc-4qz5-3uag
25
url VCID-da5g-ea4u-qfeh
vulnerability_id VCID-da5g-ea4u-qfeh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14844
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14844
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890767
reference_id 1890767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890767
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:32Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14844
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-da5g-ea4u-qfeh
26
url VCID-dcyd-xspe-q7eh
vulnerability_id VCID-dcyd-xspe-q7eh
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14791
reference_id
reference_type
scores
0
value 0.00423
scoring_system epss
scoring_elements 0.62004
published_at 2026-04-01T12:55:00Z
1
value 0.00423
scoring_system epss
scoring_elements 0.62063
published_at 2026-04-02T12:55:00Z
2
value 0.00423
scoring_system epss
scoring_elements 0.62155
published_at 2026-04-21T12:55:00Z
3
value 0.00423
scoring_system epss
scoring_elements 0.62095
published_at 2026-04-04T12:55:00Z
4
value 0.00423
scoring_system epss
scoring_elements 0.62064
published_at 2026-04-07T12:55:00Z
5
value 0.00423
scoring_system epss
scoring_elements 0.62114
published_at 2026-04-08T12:55:00Z
6
value 0.00423
scoring_system epss
scoring_elements 0.62132
published_at 2026-04-09T12:55:00Z
7
value 0.00423
scoring_system epss
scoring_elements 0.62152
published_at 2026-04-11T12:55:00Z
8
value 0.00423
scoring_system epss
scoring_elements 0.62141
published_at 2026-04-12T12:55:00Z
9
value 0.00423
scoring_system epss
scoring_elements 0.6212
published_at 2026-04-13T12:55:00Z
10
value 0.00423
scoring_system epss
scoring_elements 0.62164
published_at 2026-04-16T12:55:00Z
11
value 0.00423
scoring_system epss
scoring_elements 0.6217
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14791
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890749
reference_id 1890749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890749
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14791
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyd-xspe-q7eh
27
url VCID-ert5-smsw-1ba2
vulnerability_id VCID-ert5-smsw-1ba2
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14771
reference_id
reference_type
scores
0
value 0.00226
scoring_system epss
scoring_elements 0.45237
published_at 2026-04-01T12:55:00Z
1
value 0.00226
scoring_system epss
scoring_elements 0.45319
published_at 2026-04-02T12:55:00Z
2
value 0.00226
scoring_system epss
scoring_elements 0.45327
published_at 2026-04-21T12:55:00Z
3
value 0.00226
scoring_system epss
scoring_elements 0.45339
published_at 2026-04-09T12:55:00Z
4
value 0.00226
scoring_system epss
scoring_elements 0.4536
published_at 2026-04-11T12:55:00Z
5
value 0.00226
scoring_system epss
scoring_elements 0.45329
published_at 2026-04-12T12:55:00Z
6
value 0.00226
scoring_system epss
scoring_elements 0.4533
published_at 2026-04-13T12:55:00Z
7
value 0.00226
scoring_system epss
scoring_elements 0.45381
published_at 2026-04-16T12:55:00Z
8
value 0.00226
scoring_system epss
scoring_elements 0.45377
published_at 2026-04-18T12:55:00Z
9
value 0.00226
scoring_system epss
scoring_elements 0.4534
published_at 2026-04-04T12:55:00Z
10
value 0.00226
scoring_system epss
scoring_elements 0.45283
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14771
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890740
reference_id 1890740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890740
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:55Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14771
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ert5-smsw-1ba2
28
url VCID-gmxv-dxp3-cuhq
vulnerability_id VCID-gmxv-dxp3-cuhq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2028
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2028
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922391
reference_id 1922391
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922391
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2028
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmxv-dxp3-cuhq
29
url VCID-h2r2-p8v7-sfc6
vulnerability_id VCID-h2r2-p8v7-sfc6
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14838
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48171
published_at 2026-04-01T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48208
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.4824
published_at 2026-04-21T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48235
published_at 2026-04-08T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48229
published_at 2026-04-09T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48254
published_at 2026-04-11T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48239
published_at 2026-04-13T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.4829
published_at 2026-04-16T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48285
published_at 2026-04-18T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48228
published_at 2026-04-12T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.48179
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14838
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890765
reference_id 1890765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890765
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:38Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14838
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2r2-p8v7-sfc6
30
url VCID-hjkk-adkv-yfdu
vulnerability_id VCID-hjkk-adkv-yfdu
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14799
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.46097
published_at 2026-04-01T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46137
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.4616
published_at 2026-04-21T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.46161
published_at 2026-04-08T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46182
published_at 2026-04-11T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46153
published_at 2026-04-12T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46162
published_at 2026-04-13T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.4622
published_at 2026-04-16T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46216
published_at 2026-04-18T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46158
published_at 2026-04-09T12:55:00Z
10
value 0.00233
scoring_system epss
scoring_elements 0.46105
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14799
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890752
reference_id 1890752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890752
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:15Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
6
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
7
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
8
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14799
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkk-adkv-yfdu
31
url VCID-hrbc-2cpw-5be7
vulnerability_id VCID-hrbc-2cpw-5be7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14773
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14773
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890742
reference_id 1890742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890742
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14773
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrbc-2cpw-5be7
32
url VCID-jate-mc8k-13gn
vulnerability_id VCID-jate-mc8k-13gn
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14830
reference_id
reference_type
scores
0
value 0.00651
scoring_system epss
scoring_elements 0.70779
published_at 2026-04-01T12:55:00Z
1
value 0.00651
scoring_system epss
scoring_elements 0.70794
published_at 2026-04-02T12:55:00Z
2
value 0.00651
scoring_system epss
scoring_elements 0.7087
published_at 2026-04-21T12:55:00Z
3
value 0.00651
scoring_system epss
scoring_elements 0.70847
published_at 2026-04-09T12:55:00Z
4
value 0.00651
scoring_system epss
scoring_elements 0.70869
published_at 2026-04-11T12:55:00Z
5
value 0.00651
scoring_system epss
scoring_elements 0.70854
published_at 2026-04-12T12:55:00Z
6
value 0.00651
scoring_system epss
scoring_elements 0.70838
published_at 2026-04-13T12:55:00Z
7
value 0.00651
scoring_system epss
scoring_elements 0.70885
published_at 2026-04-16T12:55:00Z
8
value 0.00651
scoring_system epss
scoring_elements 0.70891
published_at 2026-04-18T12:55:00Z
9
value 0.00651
scoring_system epss
scoring_elements 0.70812
published_at 2026-04-04T12:55:00Z
10
value 0.00651
scoring_system epss
scoring_elements 0.70787
published_at 2026-04-07T12:55:00Z
11
value 0.00651
scoring_system epss
scoring_elements 0.70831
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14830
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890762
reference_id 1890762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890762
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:48Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14830
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jate-mc8k-13gn
33
url VCID-k4fk-qkr8-1uac
vulnerability_id VCID-k4fk-qkr8-1uac
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14846
reference_id
reference_type
scores
0
value 0.00651
scoring_system epss
scoring_elements 0.70779
published_at 2026-04-01T12:55:00Z
1
value 0.00651
scoring_system epss
scoring_elements 0.70794
published_at 2026-04-02T12:55:00Z
2
value 0.00651
scoring_system epss
scoring_elements 0.7087
published_at 2026-04-21T12:55:00Z
3
value 0.00651
scoring_system epss
scoring_elements 0.70847
published_at 2026-04-09T12:55:00Z
4
value 0.00651
scoring_system epss
scoring_elements 0.70869
published_at 2026-04-11T12:55:00Z
5
value 0.00651
scoring_system epss
scoring_elements 0.70854
published_at 2026-04-12T12:55:00Z
6
value 0.00651
scoring_system epss
scoring_elements 0.70838
published_at 2026-04-13T12:55:00Z
7
value 0.00651
scoring_system epss
scoring_elements 0.70885
published_at 2026-04-16T12:55:00Z
8
value 0.00651
scoring_system epss
scoring_elements 0.70891
published_at 2026-04-18T12:55:00Z
9
value 0.00651
scoring_system epss
scoring_elements 0.70812
published_at 2026-04-04T12:55:00Z
10
value 0.00651
scoring_system epss
scoring_elements 0.70787
published_at 2026-04-07T12:55:00Z
11
value 0.00651
scoring_system epss
scoring_elements 0.70831
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14846
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890769
reference_id 1890769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890769
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:29Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14846
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4fk-qkr8-1uac
34
url VCID-ndhs-j4q8-zkf8
vulnerability_id VCID-ndhs-j4q8-zkf8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14821
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14821
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890758
reference_id 1890758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890758
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:53Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14821
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ndhs-j4q8-zkf8
35
url VCID-njkb-a6xx-wke9
vulnerability_id VCID-njkb-a6xx-wke9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14845
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14845
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890768
reference_id 1890768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890768
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:31Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14845
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njkb-a6xx-wke9
36
url VCID-pawh-67dd-xbay
vulnerability_id VCID-pawh-67dd-xbay
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14868
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14868
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890776
reference_id 1890776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890776
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:10Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14868
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pawh-67dd-xbay
37
url VCID-pfkc-qtn3-skgp
vulnerability_id VCID-pfkc-qtn3-skgp
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14769
reference_id
reference_type
scores
0
value 0.01438
scoring_system epss
scoring_elements 0.80644
published_at 2026-04-01T12:55:00Z
1
value 0.01438
scoring_system epss
scoring_elements 0.80652
published_at 2026-04-02T12:55:00Z
2
value 0.01438
scoring_system epss
scoring_elements 0.80741
published_at 2026-04-21T12:55:00Z
3
value 0.01438
scoring_system epss
scoring_elements 0.80674
published_at 2026-04-04T12:55:00Z
4
value 0.01438
scoring_system epss
scoring_elements 0.8067
published_at 2026-04-07T12:55:00Z
5
value 0.01438
scoring_system epss
scoring_elements 0.80698
published_at 2026-04-08T12:55:00Z
6
value 0.01438
scoring_system epss
scoring_elements 0.80708
published_at 2026-04-09T12:55:00Z
7
value 0.01438
scoring_system epss
scoring_elements 0.80724
published_at 2026-04-11T12:55:00Z
8
value 0.01438
scoring_system epss
scoring_elements 0.80711
published_at 2026-04-12T12:55:00Z
9
value 0.01438
scoring_system epss
scoring_elements 0.80703
published_at 2026-04-13T12:55:00Z
10
value 0.01438
scoring_system epss
scoring_elements 0.80737
published_at 2026-04-16T12:55:00Z
11
value 0.01438
scoring_system epss
scoring_elements 0.80738
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14769
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890739
reference_id 1890739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890739
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14769
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pfkc-qtn3-skgp
38
url VCID-pmhc-1rhq-gfeb
vulnerability_id VCID-pmhc-1rhq-gfeb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14765
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82525
published_at 2026-04-01T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.82539
published_at 2026-04-02T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.82629
published_at 2026-04-21T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-04T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.8255
published_at 2026-04-07T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82576
published_at 2026-04-08T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-09T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82602
published_at 2026-04-11T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-12T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.82589
published_at 2026-04-13T12:55:00Z
10
value 0.01757
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890738
reference_id 1890738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890738
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
12
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
13
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
14
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
17
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
18
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
19
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14765
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb
39
url VCID-ptkb-y547-skg4
vulnerability_id VCID-ptkb-y547-skg4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14860
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40685
published_at 2026-04-01T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40769
published_at 2026-04-02T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40681
published_at 2026-04-21T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40779
published_at 2026-04-09T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40798
published_at 2026-04-11T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40763
published_at 2026-04-12T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40745
published_at 2026-04-13T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40789
published_at 2026-04-16T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40759
published_at 2026-04-18T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40796
published_at 2026-04-04T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40722
published_at 2026-04-07T12:55:00Z
11
value 0.00189
scoring_system epss
scoring_elements 0.40772
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14860
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890772
reference_id 1890772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890772
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:17Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14860
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkb-y547-skg4
40
url VCID-qe1p-f4h5-uyga
vulnerability_id VCID-qe1p-f4h5-uyga
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14812
reference_id
reference_type
scores
0
value 0.01394
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-01T12:55:00Z
1
value 0.01394
scoring_system epss
scoring_elements 0.80338
published_at 2026-04-02T12:55:00Z
2
value 0.01394
scoring_system epss
scoring_elements 0.80417
published_at 2026-04-21T12:55:00Z
3
value 0.01394
scoring_system epss
scoring_elements 0.80358
published_at 2026-04-04T12:55:00Z
4
value 0.01394
scoring_system epss
scoring_elements 0.80347
published_at 2026-04-07T12:55:00Z
5
value 0.01394
scoring_system epss
scoring_elements 0.80376
published_at 2026-04-08T12:55:00Z
6
value 0.01394
scoring_system epss
scoring_elements 0.80386
published_at 2026-04-09T12:55:00Z
7
value 0.01394
scoring_system epss
scoring_elements 0.80405
published_at 2026-04-11T12:55:00Z
8
value 0.01394
scoring_system epss
scoring_elements 0.8039
published_at 2026-04-12T12:55:00Z
9
value 0.01394
scoring_system epss
scoring_elements 0.80383
published_at 2026-04-13T12:55:00Z
10
value 0.01394
scoring_system epss
scoring_elements 0.80412
published_at 2026-04-16T12:55:00Z
11
value 0.01394
scoring_system epss
scoring_elements 0.80413
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890756
reference_id 1890756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890756
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
8
reference_url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
10
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
11
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
12
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
13
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
14
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
15
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
16
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
17
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14812
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga
41
url VCID-qrcr-rtqs-f3g7
vulnerability_id VCID-qrcr-rtqs-f3g7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14794
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14794
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890751
reference_id 1890751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890751
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14794
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qrcr-rtqs-f3g7
42
url VCID-r5fp-cz89-k3gn
vulnerability_id VCID-r5fp-cz89-k3gn
summary Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Trade Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Trade Management accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14876
reference_id
reference_type
scores
0
value 0.02024
scoring_system epss
scoring_elements 0.83809
published_at 2026-04-21T12:55:00Z
1
value 0.02024
scoring_system epss
scoring_elements 0.8372
published_at 2026-04-02T12:55:00Z
2
value 0.02024
scoring_system epss
scoring_elements 0.83773
published_at 2026-04-13T12:55:00Z
3
value 0.02024
scoring_system epss
scoring_elements 0.83807
published_at 2026-04-16T12:55:00Z
4
value 0.02024
scoring_system epss
scoring_elements 0.83808
published_at 2026-04-18T12:55:00Z
5
value 0.02024
scoring_system epss
scoring_elements 0.83707
published_at 2026-04-01T12:55:00Z
6
value 0.02024
scoring_system epss
scoring_elements 0.83734
published_at 2026-04-04T12:55:00Z
7
value 0.02024
scoring_system epss
scoring_elements 0.83737
published_at 2026-04-07T12:55:00Z
8
value 0.02024
scoring_system epss
scoring_elements 0.83761
published_at 2026-04-08T12:55:00Z
9
value 0.02024
scoring_system epss
scoring_elements 0.83767
published_at 2026-04-09T12:55:00Z
10
value 0.02024
scoring_system epss
scoring_elements 0.83783
published_at 2026-04-11T12:55:00Z
11
value 0.02024
scoring_system epss
scoring_elements 0.83777
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14876
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-1283/
reference_id ZDI-20-1283
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:58:20Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-1283/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14876
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5fp-cz89-k3gn
43
url VCID-r6xq-en8s-u3db
vulnerability_id VCID-r6xq-en8s-u3db
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14852
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14852
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890771
reference_id 1890771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890771
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:22Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14852
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r6xq-en8s-u3db
44
url VCID-sq21-9e5z-muhb
vulnerability_id VCID-sq21-9e5z-muhb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2042
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27967
published_at 2026-04-01T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.28039
published_at 2026-04-02T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27832
published_at 2026-04-21T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27983
published_at 2026-04-09T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27986
published_at 2026-04-11T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27944
published_at 2026-04-12T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27885
published_at 2026-04-13T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27894
published_at 2026-04-16T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27875
published_at 2026-04-18T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.28081
published_at 2026-04-04T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27876
published_at 2026-04-07T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27942
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2042
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922397
reference_id 1922397
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922397
3
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 2.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/
url https://security.gentoo.org/glsa/202105-27
4
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 2.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2042
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sq21-9e5z-muhb
45
url VCID-sruz-agx3-3feq
vulnerability_id VCID-sruz-agx3-3feq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14878
reference_id
reference_type
scores
0
value 0.00897
scoring_system epss
scoring_elements 0.75569
published_at 2026-04-01T12:55:00Z
1
value 0.00897
scoring_system epss
scoring_elements 0.75571
published_at 2026-04-02T12:55:00Z
2
value 0.00897
scoring_system epss
scoring_elements 0.75652
published_at 2026-04-21T12:55:00Z
3
value 0.00897
scoring_system epss
scoring_elements 0.75615
published_at 2026-04-08T12:55:00Z
4
value 0.00897
scoring_system epss
scoring_elements 0.75626
published_at 2026-04-13T12:55:00Z
5
value 0.00897
scoring_system epss
scoring_elements 0.7565
published_at 2026-04-11T12:55:00Z
6
value 0.00897
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-12T12:55:00Z
7
value 0.00897
scoring_system epss
scoring_elements 0.75663
published_at 2026-04-16T12:55:00Z
8
value 0.00897
scoring_system epss
scoring_elements 0.75667
published_at 2026-04-18T12:55:00Z
9
value 0.00897
scoring_system epss
scoring_elements 0.75601
published_at 2026-04-04T12:55:00Z
10
value 0.00897
scoring_system epss
scoring_elements 0.75581
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14878
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890780
reference_id 1890780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890780
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:53:51Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14878
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sruz-agx3-3feq
46
url VCID-swdu-cgp2-77e4
vulnerability_id VCID-swdu-cgp2-77e4
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14870
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14870
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890778
reference_id 1890778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890778
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:07Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14870
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-swdu-cgp2-77e4
47
url VCID-t31g-7742-fqhk
vulnerability_id VCID-t31g-7742-fqhk
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14786
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-01T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-02T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74497
published_at 2026-04-21T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74442
published_at 2026-04-04T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-07T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-08T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-09T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74488
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.7446
published_at 2026-04-13T12:55:00Z
10
value 0.00825
scoring_system epss
scoring_elements 0.74498
published_at 2026-04-16T12:55:00Z
11
value 0.00825
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14786
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890746
reference_id 1890746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890746
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14786
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t31g-7742-fqhk
48
url VCID-tv36-3tsk-uket
vulnerability_id VCID-tv36-3tsk-uket
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14891
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14891
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890782
reference_id 1890782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890782
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:53Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14891
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tv36-3tsk-uket
49
url VCID-vap7-ycjn-73d1
vulnerability_id VCID-vap7-ycjn-73d1
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14793
reference_id
reference_type
scores
0
value 0.00843
scoring_system epss
scoring_elements 0.74705
published_at 2026-04-01T12:55:00Z
1
value 0.00843
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-07T12:55:00Z
2
value 0.00843
scoring_system epss
scoring_elements 0.74783
published_at 2026-04-21T12:55:00Z
3
value 0.00843
scoring_system epss
scoring_elements 0.74735
published_at 2026-04-04T12:55:00Z
4
value 0.00843
scoring_system epss
scoring_elements 0.74741
published_at 2026-04-08T12:55:00Z
5
value 0.00843
scoring_system epss
scoring_elements 0.74756
published_at 2026-04-09T12:55:00Z
6
value 0.00843
scoring_system epss
scoring_elements 0.74779
published_at 2026-04-11T12:55:00Z
7
value 0.00843
scoring_system epss
scoring_elements 0.74758
published_at 2026-04-12T12:55:00Z
8
value 0.00843
scoring_system epss
scoring_elements 0.74749
published_at 2026-04-13T12:55:00Z
9
value 0.00843
scoring_system epss
scoring_elements 0.74785
published_at 2026-04-16T12:55:00Z
10
value 0.00843
scoring_system epss
scoring_elements 0.74793
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14793
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890750
reference_id 1890750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890750
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14793
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vap7-ycjn-73d1
50
url VCID-yf77-atgx-dyh3
vulnerability_id VCID-yf77-atgx-dyh3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14888
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14888
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890781
reference_id 1890781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890781
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:56Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14888
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yf77-atgx-dyh3
51
url VCID-zn55-b12v-5fax
vulnerability_id VCID-zn55-b12v-5fax
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14873
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14873
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890779
reference_id 1890779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890779
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:06Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2020-14873
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn55-b12v-5fax
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid