Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/44144?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44144?format=api", "vulnerability_id": "VCID-1ydy-pcyw-2fh5", "summary": "Multiple vulnerabilities have been found in MariaDB and MySQL, the\n worst of which could result in privilege escalation.", "aliases": [ { "alias": "CVE-2019-2529" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/398822?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=aarch64&distroversion=v3.7&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=aarch64&distroversion=v3.7&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/398825?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=s390x&distroversion=v3.7&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=s390x&distroversion=v3.7&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/545506?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=aarch64&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=aarch64&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/545507?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=armhf&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=armhf&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/545508?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/545509?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=s390x&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=s390x&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/545510?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=x86&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=x86&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/545511?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=x86_64&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=x86_64&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/398823?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=armhf&distroversion=v3.7&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=armhf&distroversion=v3.7&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/398824?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=ppc64le&distroversion=v3.7&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=ppc64le&distroversion=v3.7&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/398826?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=x86&distroversion=v3.7&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=x86&distroversion=v3.7&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/398827?format=api", "purl": "pkg:apk/alpine/mariadb@10.1.38-r0?arch=x86_64&distroversion=v3.7&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.1.38-r0%3Farch=x86_64&distroversion=v3.7&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/76325?format=api", "purl": "pkg:ebuild/dev-db/mariadb@10.1.38-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.1.38-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/76326?format=api", "purl": "pkg:ebuild/dev-db/mariadb@10.2.22", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mariadb@10.2.22" }, { "url": "http://public2.vulnerablecode.io/api/packages/76327?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.6.42", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.6.42" }, { "url": "http://public2.vulnerablecode.io/api/packages/76328?format=api", "purl": "pkg:ebuild/dev-db/mysql@5.7.24", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.24" }, { "url": "http://public2.vulnerablecode.io/api/packages/76329?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.1.38-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.1.38-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/76330?format=api", "purl": "pkg:ebuild/dev-db/mysql@10.2.22", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@10.2.22" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/101198?format=api", "purl": "pkg:rpm/redhat/mariadb@1:5.5.64-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-161c-myft-2ka7" }, { "vulnerability": "VCID-1ydy-pcyw-2fh5" }, { "vulnerability": "VCID-372a-11r4-fyad" }, { "vulnerability": "VCID-3nbc-83rh-f7e6" }, { "vulnerability": "VCID-7jhn-7s9s-p7c6" }, { "vulnerability": "VCID-b4kn-wdpj-a3dm" }, { "vulnerability": "VCID-b675-vjj2-2yb6" }, { "vulnerability": "VCID-kvpj-2kxx-jbfr" }, { "vulnerability": "VCID-my1q-4m9d-9fgj" }, { "vulnerability": "VCID-u9aw-t2h8-y7hk" }, { "vulnerability": "VCID-z183-g8nz-4kde" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mariadb@1:5.5.64-1%3Farch=el7" }, { "url": "http://public2.vulnerablecode.io/api/packages/97671?format=api", "purl": "pkg:rpm/redhat/rh-mysql80-mysql@8.0.17-1?arch=el7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13sp-442v-dfej" }, { "vulnerability": "VCID-161c-myft-2ka7" }, { "vulnerability": "VCID-1j3z-nx7y-u7fz" }, { "vulnerability": "VCID-1n31-82eg-qubh" }, { "vulnerability": "VCID-1u5d-edgd-w3hd" }, { "vulnerability": "VCID-1vsd-dyj3-mqb9" }, { "vulnerability": "VCID-1ydy-pcyw-2fh5" }, { "vulnerability": "VCID-372a-11r4-fyad" }, { "vulnerability": "VCID-3j7t-e3sn-43ak" }, { "vulnerability": "VCID-43sr-d691-eqaf" }, { "vulnerability": "VCID-4mn2-jrq4-myh4" }, { "vulnerability": "VCID-4phz-xufp-cffa" }, { "vulnerability": "VCID-52hg-swrp-z7ek" }, { "vulnerability": "VCID-5c5n-1jba-8ffd" }, { "vulnerability": "VCID-6b9f-dtxh-gud7" }, { "vulnerability": "VCID-6cfa-erkw-t7hw" }, { "vulnerability": "VCID-6nt9-mast-c3h3" }, { "vulnerability": "VCID-6yqe-sv9d-1kar" }, { "vulnerability": "VCID-6zz1-77w8-gfcc" }, { "vulnerability": "VCID-7jhn-7s9s-p7c6" }, { "vulnerability": "VCID-8d71-tfhb-zbaw" }, { "vulnerability": "VCID-8ubm-2vbh-tfem" }, { "vulnerability": "VCID-8wpp-suz5-jbam" }, { "vulnerability": "VCID-9d2r-yg3e-zyaq" }, { "vulnerability": "VCID-9kbe-thxk-suhv" }, { "vulnerability": "VCID-a9xe-vymh-zydx" }, { "vulnerability": "VCID-abbp-ymdk-3qhb" }, { "vulnerability": "VCID-anm3-saah-zbgh" }, { "vulnerability": "VCID-aqcg-c2cd-w7cf" }, { "vulnerability": "VCID-avbm-82g2-63e1" }, { "vulnerability": "VCID-ay72-bb73-3uax" }, { "vulnerability": "VCID-bnze-v1g8-xqb3" }, { "vulnerability": "VCID-c7cu-26aq-u3bp" }, { "vulnerability": "VCID-cg4f-dt7m-1yfh" }, { "vulnerability": "VCID-cjah-v363-gbbb" }, { "vulnerability": "VCID-cpza-jecw-yube" }, { "vulnerability": "VCID-d2vg-7yum-93cs" }, { "vulnerability": "VCID-d4zj-hzc4-qkc2" }, { "vulnerability": "VCID-dmx7-q22d-aqhb" }, { "vulnerability": "VCID-eatn-18rb-p3dx" }, { "vulnerability": "VCID-ebse-vm79-w3gs" }, { "vulnerability": "VCID-ecwk-9z6r-1kbu" }, { "vulnerability": "VCID-ejfp-54s3-z3cz" }, { "vulnerability": "VCID-fees-9138-kfa9" }, { "vulnerability": "VCID-ff4f-5j4s-mbdw" }, { "vulnerability": "VCID-g8c8-2q88-mqbt" }, { "vulnerability": "VCID-gtjd-jgxb-xqc3" }, { "vulnerability": "VCID-hcpu-5txr-5kc3" }, { "vulnerability": "VCID-j8h7-xwck-h3cn" }, { "vulnerability": "VCID-jd9q-fqce-fyfe" }, { "vulnerability": "VCID-jksx-p6u4-2fda" }, { "vulnerability": "VCID-k22g-ysw2-7qee" }, { "vulnerability": "VCID-k6kn-quk8-tbfz" }, { "vulnerability": "VCID-kbd8-8x9h-yygt" }, { "vulnerability": "VCID-kc69-v357-tfhw" }, { "vulnerability": "VCID-m5bk-j92c-xfbb" }, { "vulnerability": "VCID-m5k3-3bmx-c7b9" }, { "vulnerability": "VCID-m6xq-97j5-c7b3" }, { "vulnerability": "VCID-mqqj-edam-g3ej" }, { "vulnerability": "VCID-mvee-sayz-pqer" }, { "vulnerability": "VCID-mwx4-k8s9-3yf8" }, { "vulnerability": "VCID-n4wq-kepg-e7dc" }, { "vulnerability": "VCID-n7uq-etxw-wfeh" }, { "vulnerability": "VCID-np6m-616p-fbav" }, { "vulnerability": "VCID-p3d4-4dfk-17bu" }, { "vulnerability": "VCID-p8xn-pqez-nfet" }, { "vulnerability": "VCID-pgwu-vssz-akdg" }, { "vulnerability": "VCID-ptm8-5dhv-jfhb" }, { "vulnerability": "VCID-pw6c-nrcf-c3fa" }, { "vulnerability": "VCID-r1t7-bu1c-7kda" }, { "vulnerability": "VCID-rpaz-z5rp-bbad" }, { "vulnerability": "VCID-ryb6-mn37-ukex" }, { "vulnerability": "VCID-s3yb-gtvm-4bbr" }, { "vulnerability": "VCID-s487-mgme-x7ck" }, { "vulnerability": "VCID-s8zp-yvug-eben" }, { "vulnerability": "VCID-sndg-xugh-rkb6" }, { "vulnerability": "VCID-ssmp-9gm6-e7dm" }, { "vulnerability": "VCID-st89-fbnh-aucz" }, { "vulnerability": "VCID-t15u-41fv-nbbb" }, { "vulnerability": "VCID-t4uh-zy3q-qbey" }, { "vulnerability": "VCID-tmud-7j5a-63cw" }, { "vulnerability": "VCID-ts3w-gvhd-j3f4" }, { "vulnerability": "VCID-tzkq-cku4-jqd9" }, { "vulnerability": "VCID-u5sq-t5nm-c7fk" }, { "vulnerability": "VCID-u9s6-p7ta-tbbj" }, { "vulnerability": "VCID-ubzc-p2rh-8kgw" }, { "vulnerability": "VCID-uejk-w3zd-kbcz" }, { "vulnerability": "VCID-up73-v7dp-67fh" }, { "vulnerability": "VCID-uut9-ztvj-jbcc" }, { "vulnerability": "VCID-uzma-wz9a-syg9" }, { "vulnerability": "VCID-v9fn-83g5-cka5" }, { "vulnerability": "VCID-vfy8-8xty-kuau" }, { "vulnerability": "VCID-vzbn-npzn-skeq" }, { "vulnerability": "VCID-wpnd-d4pd-hucp" }, { "vulnerability": "VCID-x642-7ktv-m3hk" }, { "vulnerability": "VCID-xdrp-wyhw-dbdt" }, { "vulnerability": "VCID-xv93-rcpc-euea" }, { "vulnerability": "VCID-xye9-trve-v3cj" }, { "vulnerability": "VCID-xzke-862m-zubf" }, { "vulnerability": "VCID-yxzb-keze-d3dn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql80-mysql@8.0.17-1%3Farch=el7" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2529.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.4268", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.4261", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42707", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42648", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42699", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42712", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42734", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42698", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42681", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2529" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:52Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190118-0002/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:52Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20190118-0002/" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:52Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "reference_url": "http://www.securityfocus.com/bid/106619", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:52Z/" } ], "url": "http://www.securityfocus.com/bid/106619" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666755", "reference_id": "1666755", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666755" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2529", "reference_id": "CVE-2019-2529", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2529" }, { "reference_url": "https://security.gentoo.org/glsa/201908-24", "reference_id": "GLSA-201908-24", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:52Z/" } ], "url": "https://security.gentoo.org/glsa/201908-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2327", "reference_id": "RHSA-2019:2327", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:52Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:2327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2484", "reference_id": "RHSA-2019:2484", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:52Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:2484" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2511", "reference_id": "RHSA-2019:2511", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:52Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2019:2511" }, { "reference_url": "https://usn.ubuntu.com/3867-1/", "reference_id": "USN-3867-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:52Z/" } ], "url": "https://usn.ubuntu.com/3867-1/" } ], "weaknesses": [], "exploits": [], "severity_range_score": "4.0 - 6.5", "exploitability": "0.5", "weighted_severity": "5.9", "risk_score": 3.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ydy-pcyw-2fh5" }