Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/mariadb@1:5.5.65-1?arch=el7
Typerpm
Namespaceredhat
Namemariadb
Version1:5.5.65-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3h99-b8mf-rkcr
vulnerability_id VCID-3h99-b8mf-rkcr
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2922.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2922
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43264
published_at 2026-04-01T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43037
published_at 2026-05-05T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43337
published_at 2026-04-08T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43352
published_at 2026-04-09T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43372
published_at 2026-04-11T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43341
published_at 2026-04-12T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43326
published_at 2026-04-13T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43387
published_at 2026-04-16T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43376
published_at 2026-04-18T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43311
published_at 2026-04-21T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43245
published_at 2026-04-24T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43248
published_at 2026-04-26T12:55:00Z
12
value 0.00209
scoring_system epss
scoring_elements 0.43169
published_at 2026-04-29T12:55:00Z
13
value 0.00209
scoring_system epss
scoring_elements 0.4332
published_at 2026-04-02T12:55:00Z
14
value 0.00209
scoring_system epss
scoring_elements 0.43348
published_at 2026-04-04T12:55:00Z
15
value 0.00209
scoring_system epss
scoring_elements 0.43286
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2922
2
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://security.netapp.com/advisory/ntap-20200416-0003/
3
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1835850
reference_id 1835850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1835850
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2922
reference_id CVE-2020-2922
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
2
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2922
17
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://security.gentoo.org/glsa/202105-27
18
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3708
19
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
20
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
21
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
22
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
23
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
24
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
25
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
26
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
27
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
28
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
29
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
30
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
31
reference_url https://usn.ubuntu.com/4350-1/
reference_id USN-4350-1
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/
url https://usn.ubuntu.com/4350-1/
fixed_packages
aliases CVE-2020-2922
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3h99-b8mf-rkcr
1
url VCID-6b9f-dtxh-gud7
vulnerability_id VCID-6b9f-dtxh-gud7
summary mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2805.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2805
reference_id
reference_type
scores
0
value 0.00484
scoring_system epss
scoring_elements 0.6529
published_at 2026-05-05T12:55:00Z
1
value 0.00484
scoring_system epss
scoring_elements 0.65298
published_at 2026-04-11T12:55:00Z
2
value 0.00484
scoring_system epss
scoring_elements 0.65285
published_at 2026-04-21T12:55:00Z
3
value 0.00484
scoring_system epss
scoring_elements 0.65257
published_at 2026-04-13T12:55:00Z
4
value 0.00484
scoring_system epss
scoring_elements 0.65292
published_at 2026-04-16T12:55:00Z
5
value 0.00484
scoring_system epss
scoring_elements 0.65302
published_at 2026-04-18T12:55:00Z
6
value 0.00484
scoring_system epss
scoring_elements 0.65299
published_at 2026-04-24T12:55:00Z
7
value 0.00484
scoring_system epss
scoring_elements 0.65312
published_at 2026-04-26T12:55:00Z
8
value 0.00484
scoring_system epss
scoring_elements 0.65309
published_at 2026-04-29T12:55:00Z
9
value 0.00484
scoring_system epss
scoring_elements 0.65225
published_at 2026-04-02T12:55:00Z
10
value 0.00484
scoring_system epss
scoring_elements 0.65175
published_at 2026-04-01T12:55:00Z
11
value 0.00484
scoring_system epss
scoring_elements 0.65251
published_at 2026-04-04T12:55:00Z
12
value 0.00484
scoring_system epss
scoring_elements 0.65217
published_at 2026-04-07T12:55:00Z
13
value 0.00484
scoring_system epss
scoring_elements 0.65267
published_at 2026-04-08T12:55:00Z
14
value 0.00484
scoring_system epss
scoring_elements 0.65279
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2805
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://seclists.org/bugtraq/2019/Aug/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://seclists.org/bugtraq/2019/Aug/1
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1732025
reference_id 1732025
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1732025
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
6
reference_url https://support.f5.com/csp/article/K04831884
reference_id K04831884
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://support.f5.com/csp/article/K04831884
7
reference_url https://support.f5.com/csp/article/K04831884?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K04831884?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://support.f5.com/csp/article/K04831884?utm_source=f5support&amp%3Butm_medium=RSS
8
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://access.redhat.com/errata/RHSA-2019:2484
9
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://access.redhat.com/errata/RHSA-2019:2511
10
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://access.redhat.com/errata/RHSA-2019:3708
11
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
12
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
13
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
reference_id Slackware-Security-Advisory-mariadb-Updates.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
16
reference_url https://usn.ubuntu.com/4070-1/
reference_id USN-4070-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://usn.ubuntu.com/4070-1/
17
reference_url https://usn.ubuntu.com/4070-2/
reference_id USN-4070-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://usn.ubuntu.com/4070-2/
18
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:17:09Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2805
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6b9f-dtxh-gud7
2
url VCID-8wpp-suz5-jbam
vulnerability_id VCID-8wpp-suz5-jbam
summary mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2737.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2737
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.4213
published_at 2026-05-05T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42535
published_at 2026-04-11T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42497
published_at 2026-04-12T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42467
published_at 2026-04-13T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42517
published_at 2026-04-16T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42493
published_at 2026-04-18T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42422
published_at 2026-04-21T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42359
published_at 2026-04-24T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42355
published_at 2026-04-26T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42272
published_at 2026-04-29T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42486
published_at 2026-04-02T12:55:00Z
11
value 0.00204
scoring_system epss
scoring_elements 0.42415
published_at 2026-04-01T12:55:00Z
12
value 0.00204
scoring_system epss
scoring_elements 0.42514
published_at 2026-04-04T12:55:00Z
13
value 0.00204
scoring_system epss
scoring_elements 0.42452
published_at 2026-04-07T12:55:00Z
14
value 0.00204
scoring_system epss
scoring_elements 0.42503
published_at 2026-04-08T12:55:00Z
15
value 0.00204
scoring_system epss
scoring_elements 0.42513
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2737
2
reference_url https://seclists.org/bugtraq/2019/Aug/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://seclists.org/bugtraq/2019/Aug/1
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1731997
reference_id 1731997
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1731997
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
reference_id A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
reference_id CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
7
reference_url https://support.f5.com/csp/article/K51272092
reference_id K51272092
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://support.f5.com/csp/article/K51272092
8
reference_url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://access.redhat.com/errata/RHSA-2019:2484
10
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://access.redhat.com/errata/RHSA-2019:2511
11
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://access.redhat.com/errata/RHSA-2019:3708
12
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
13
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
14
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
reference_id Slackware-Security-Advisory-mariadb-Updates.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
17
reference_url https://usn.ubuntu.com/4070-1/
reference_id USN-4070-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://usn.ubuntu.com/4070-1/
18
reference_url https://usn.ubuntu.com/4070-2/
reference_id USN-4070-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://usn.ubuntu.com/4070-2/
19
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:30Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2737
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wpp-suz5-jbam
3
url VCID-t4uh-zy3q-qbey
vulnerability_id VCID-t4uh-zy3q-qbey
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2739.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2739
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09248
published_at 2026-05-05T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09369
published_at 2026-04-11T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09341
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09328
published_at 2026-04-13T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09217
published_at 2026-04-16T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09216
published_at 2026-04-18T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09367
published_at 2026-04-21T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09418
published_at 2026-04-24T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09374
published_at 2026-04-26T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09336
published_at 2026-04-29T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09273
published_at 2026-04-02T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09274
published_at 2026-04-01T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.09325
published_at 2026-04-04T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.09239
published_at 2026-04-07T12:55:00Z
14
value 0.00032
scoring_system epss
scoring_elements 0.09314
published_at 2026-04-08T12:55:00Z
15
value 0.00032
scoring_system epss
scoring_elements 0.0936
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2739
2
reference_url https://seclists.org/bugtraq/2019/Aug/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://seclists.org/bugtraq/2019/Aug/1
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1731999
reference_id 1731999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1731999
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
reference_id A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
reference_id CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
7
reference_url https://support.f5.com/csp/article/K51272092
reference_id K51272092
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://support.f5.com/csp/article/K51272092
8
reference_url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://access.redhat.com/errata/RHSA-2019:2484
10
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://access.redhat.com/errata/RHSA-2019:2511
11
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://access.redhat.com/errata/RHSA-2019:3708
12
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
13
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
14
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
reference_id Slackware-Security-Advisory-mariadb-Updates.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
17
reference_url https://usn.ubuntu.com/4070-1/
reference_id USN-4070-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://usn.ubuntu.com/4070-1/
18
reference_url https://usn.ubuntu.com/4070-2/
reference_id USN-4070-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://usn.ubuntu.com/4070-2/
19
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:27Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2739
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4uh-zy3q-qbey
4
url VCID-vcyx-58nm-gbba
vulnerability_id VCID-vcyx-58nm-gbba
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2007
reference_id
reference_type
scores
0
value 0.00531
scoring_system epss
scoring_elements 0.67187
published_at 2026-04-01T12:55:00Z
1
value 0.00531
scoring_system epss
scoring_elements 0.67224
published_at 2026-04-02T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.67292
published_at 2026-05-05T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.67289
published_at 2026-04-09T12:55:00Z
4
value 0.00531
scoring_system epss
scoring_elements 0.67309
published_at 2026-04-11T12:55:00Z
5
value 0.00531
scoring_system epss
scoring_elements 0.67296
published_at 2026-04-12T12:55:00Z
6
value 0.00531
scoring_system epss
scoring_elements 0.6726
published_at 2026-04-13T12:55:00Z
7
value 0.00531
scoring_system epss
scoring_elements 0.67295
published_at 2026-04-16T12:55:00Z
8
value 0.00531
scoring_system epss
scoring_elements 0.67308
published_at 2026-04-18T12:55:00Z
9
value 0.00531
scoring_system epss
scoring_elements 0.67287
published_at 2026-04-21T12:55:00Z
10
value 0.00531
scoring_system epss
scoring_elements 0.67307
published_at 2026-04-24T12:55:00Z
11
value 0.00531
scoring_system epss
scoring_elements 0.67318
published_at 2026-04-26T12:55:00Z
12
value 0.00531
scoring_system epss
scoring_elements 0.67319
published_at 2026-04-29T12:55:00Z
13
value 0.00531
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-04T12:55:00Z
14
value 0.00531
scoring_system epss
scoring_elements 0.67225
published_at 2026-04-07T12:55:00Z
15
value 0.00531
scoring_system epss
scoring_elements 0.67276
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2007
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922382
reference_id 1922382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922382
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210622-0001/
reference_id ntap-20210622-0001
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://security.netapp.com/advisory/ntap-20210622-0001/
6
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3708
7
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
8
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
9
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
10
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
11
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
12
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
13
reference_url https://access.redhat.com/errata/RHSA-2020:5503
reference_id RHSA-2020:5503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5503
14
reference_url https://access.redhat.com/errata/RHSA-2020:5655
reference_id RHSA-2020:5655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5655
15
reference_url https://access.redhat.com/errata/RHSA-2020:5660
reference_id RHSA-2020:5660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5660
16
reference_url https://access.redhat.com/errata/RHSA-2020:5662
reference_id RHSA-2020:5662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5662
17
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
aliases CVE-2021-2007
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcyx-58nm-gbba
5
url VCID-vfy8-8xty-kuau
vulnerability_id VCID-vfy8-8xty-kuau
summary mysql: Server: XML unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2740.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2740
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.61219
published_at 2026-05-05T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61282
published_at 2026-04-11T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61268
published_at 2026-04-12T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61249
published_at 2026-04-13T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.61289
published_at 2026-04-16T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.61294
published_at 2026-04-18T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.61274
published_at 2026-04-21T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.61261
published_at 2026-04-24T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61277
published_at 2026-04-26T12:55:00Z
9
value 0.00409
scoring_system epss
scoring_elements 0.6127
published_at 2026-04-29T12:55:00Z
10
value 0.00409
scoring_system epss
scoring_elements 0.61205
published_at 2026-04-02T12:55:00Z
11
value 0.00409
scoring_system epss
scoring_elements 0.61125
published_at 2026-04-01T12:55:00Z
12
value 0.00409
scoring_system epss
scoring_elements 0.61233
published_at 2026-04-04T12:55:00Z
13
value 0.00409
scoring_system epss
scoring_elements 0.612
published_at 2026-04-07T12:55:00Z
14
value 0.00409
scoring_system epss
scoring_elements 0.61247
published_at 2026-04-08T12:55:00Z
15
value 0.00409
scoring_system epss
scoring_elements 0.61262
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2740
2
reference_url https://seclists.org/bugtraq/2019/Aug/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://seclists.org/bugtraq/2019/Aug/1
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1732000
reference_id 1732000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1732000
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
reference_id A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
reference_id CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
7
reference_url https://support.f5.com/csp/article/K03444640
reference_id K03444640
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://support.f5.com/csp/article/K03444640
8
reference_url https://support.f5.com/csp/article/K03444640?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K03444640?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://support.f5.com/csp/article/K03444640?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://access.redhat.com/errata/RHSA-2019:2484
reference_id RHSA-2019:2484
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://access.redhat.com/errata/RHSA-2019:2484
10
reference_url https://access.redhat.com/errata/RHSA-2019:2511
reference_id RHSA-2019:2511
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://access.redhat.com/errata/RHSA-2019:2511
11
reference_url https://access.redhat.com/errata/RHSA-2019:3708
reference_id RHSA-2019:3708
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://access.redhat.com/errata/RHSA-2019:3708
12
reference_url https://access.redhat.com/errata/RHSA-2020:1100
reference_id RHSA-2020:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1100
13
reference_url https://access.redhat.com/errata/RHSA-2020:4174
reference_id RHSA-2020:4174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4174
14
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
reference_id Slackware-Security-Advisory-mariadb-Updates.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html
17
reference_url https://usn.ubuntu.com/4070-1/
reference_id USN-4070-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://usn.ubuntu.com/4070-1/
18
reference_url https://usn.ubuntu.com/4070-2/
reference_id USN-4070-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://usn.ubuntu.com/4070-2/
19
reference_url https://usn.ubuntu.com/4070-3/
reference_id USN-4070-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:26Z/
url https://usn.ubuntu.com/4070-3/
fixed_packages
aliases CVE-2019-2740
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfy8-8xty-kuau
Fixing_vulnerabilities
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mariadb@1:5.5.65-1%3Farch=el7