Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
Typeapk
Namespacealpine
Namemariadb
Version10.6.7-r0
Qualifiers
arch ppc64le
distroversion v3.18
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version10.6.8-r0
Latest_non_vulnerable_version10.11.11-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-27zh-jckv-xkgy
vulnerability_id VCID-27zh-jckv-xkgy
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31622.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31622
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10076
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10136
published_at 2026-04-04T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10034
published_at 2026-04-07T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.1011
published_at 2026-04-08T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10171
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.1021
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10151
published_at 2026-04-13T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10024
published_at 2026-04-16T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.10001
published_at 2026-04-18T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.10131
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31622
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092354
reference_id 2092354
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092354
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2022-31622
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-27zh-jckv-xkgy
1
url VCID-33z5-5vrs-7ud3
vulnerability_id VCID-33z5-5vrs-7ud3
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24050.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24050
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21541
published_at 2026-04-21T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21564
published_at 2026-04-16T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21571
published_at 2026-04-18T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21514
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21591
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.2165
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21662
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21624
published_at 2026-04-12T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21566
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24235
published_at 2026-04-04T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24199
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2069833
reference_id 2069833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2069833
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2022-24050
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-33z5-5vrs-7ud3
2
url VCID-525u-kpee-auhh
vulnerability_id VCID-525u-kpee-auhh
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46668.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46668
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10528
published_at 2026-04-01T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10673
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10737
published_at 2026-04-11T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10594
published_at 2026-04-07T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10667
published_at 2026-04-08T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10723
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10706
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10681
published_at 2026-04-13T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10541
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10557
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10686
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050032
reference_id 2050032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050032
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2021-46668
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-525u-kpee-auhh
3
url VCID-5hbe-vqqs-sbav
vulnerability_id VCID-5hbe-vqqs-sbav
summary mariadb: Crash executing query with VIEW, aggregate and subquery
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46659.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46659
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11709
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11831
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11873
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11659
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11744
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11797
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11808
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.1177
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11745
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11608
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11607
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.1173
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2049302
reference_id 2049302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2049302
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2021-46659
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hbe-vqqs-sbav
4
url VCID-9ef6-tbwp-pbct
vulnerability_id VCID-9ef6-tbwp-pbct
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24052.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24052
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.1999
published_at 2026-04-21T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19991
published_at 2026-04-16T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19995
published_at 2026-04-18T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20035
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20094
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20112
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20067
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20009
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.2275
published_at 2026-04-04T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22706
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24052
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2068211
reference_id 2068211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2068211
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2022-24052
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ef6-tbwp-pbct
5
url VCID-b3mn-83vb-jbdw
vulnerability_id VCID-b3mn-83vb-jbdw
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24048.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24048
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.1999
published_at 2026-04-21T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19991
published_at 2026-04-16T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19995
published_at 2026-04-18T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20035
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20094
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20112
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20067
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20009
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.2275
published_at 2026-04-04T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22706
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24048
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2068234
reference_id 2068234
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2068234
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2022-24048
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3mn-83vb-jbdw
6
url VCID-g2x8-3226-jufz
vulnerability_id VCID-g2x8-3226-jufz
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31624
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13585
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13646
published_at 2026-04-04T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13445
published_at 2026-04-21T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13526
published_at 2026-04-08T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13576
published_at 2026-04-09T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13548
published_at 2026-04-11T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.1351
published_at 2026-04-12T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13463
published_at 2026-04-13T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13376
published_at 2026-04-16T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13374
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092362
reference_id 2092362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092362
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2022-31624
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2x8-3226-jufz
7
url VCID-mpbk-tjrm-pufu
vulnerability_id VCID-mpbk-tjrm-pufu
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46665.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46665
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12631
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12683
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12651
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1261
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12565
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12471
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12477
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050026
reference_id 2050026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050026
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2021-46665
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mpbk-tjrm-pufu
8
url VCID-nw1y-ajx5-ebej
vulnerability_id VCID-nw1y-ajx5-ebej
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31623.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31623
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09536
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09627
published_at 2026-04-21T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09621
published_at 2026-04-09T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09628
published_at 2026-04-11T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09598
published_at 2026-04-12T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09582
published_at 2026-04-13T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09475
published_at 2026-04-16T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09478
published_at 2026-04-18T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09585
published_at 2026-04-04T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09498
published_at 2026-04-07T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09573
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/MariaDB/server/pull/1938
reference_id 1938
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://github.com/MariaDB/server/pull/1938
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092360
reference_id 2092360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092360
6
reference_url https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
reference_id 7c30bc38a588b22b01f11130cfe99e7f36accf94
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
7
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
8
reference_url https://jira.mariadb.org/browse/MDEV-26561
reference_id MDEV-26561
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://jira.mariadb.org/browse/MDEV-26561
9
reference_url https://jira.mariadb.org/browse/MDEV-26574
reference_id MDEV-26574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://jira.mariadb.org/browse/MDEV-26574
10
reference_url https://security.netapp.com/advisory/ntap-20220707-0006/
reference_id ntap-20220707-0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://security.netapp.com/advisory/ntap-20220707-0006/
11
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
12
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
13
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
14
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
15
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2022-31623
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw1y-ajx5-ebej
9
url VCID-pk23-a5y3-4ub5
vulnerability_id VCID-pk23-a5y3-4ub5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31621
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09534
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09625
published_at 2026-04-21T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09584
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09497
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09572
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09619
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09626
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09596
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.0958
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09473
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09477
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31621
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092353
reference_id 2092353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092353
5
reference_url https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
reference_id b1351c15946349f9daa7e5297fb2ac6f3139e4a8
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
6
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
7
reference_url https://jira.mariadb.org/browse/MDEV-26561
reference_id MDEV-26561
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://jira.mariadb.org/browse/MDEV-26561
8
reference_url https://jira.mariadb.org/browse/MDEV-26574
reference_id MDEV-26574
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://jira.mariadb.org/browse/MDEV-26574
9
reference_url https://jira.mariadb.org/browse/MDEV-26574?filter=-2
reference_id MDEV-26574?filter=-2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://jira.mariadb.org/browse/MDEV-26574?filter=-2
10
reference_url https://security.netapp.com/advisory/ntap-20220707-0006/
reference_id ntap-20220707-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://security.netapp.com/advisory/ntap-20220707-0006/
11
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
12
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
13
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
14
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
15
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2022-31621
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pk23-a5y3-4ub5
10
url VCID-pkew-29au-ukac
vulnerability_id VCID-pkew-29au-ukac
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46664.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46664
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12631
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12683
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12651
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1261
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12565
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12471
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12477
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050024
reference_id 2050024
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050024
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2021-46664
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pkew-29au-ukac
11
url VCID-smhx-5fa3-4yay
vulnerability_id VCID-smhx-5fa3-4yay
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24051.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24051.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24051
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17737
published_at 2026-04-21T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.1769
published_at 2026-04-16T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.177
published_at 2026-04-18T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.1767
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17759
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17821
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17837
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17794
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17746
published_at 2026-04-13T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20659
published_at 2026-04-04T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20601
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24051
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2068233
reference_id 2068233
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2068233
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2022-24051
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-smhx-5fa3-4yay
12
url VCID-uhvt-x3cq-5kdw
vulnerability_id VCID-uhvt-x3cq-5kdw
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46661.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46661
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12631
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12683
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12651
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1261
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12565
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12471
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12477
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050017
reference_id 2050017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050017
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2021-46661
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhvt-x3cq-5kdw
13
url VCID-w69n-gw41-kkdv
vulnerability_id VCID-w69n-gw41-kkdv
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46663.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46663
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12631
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12683
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12651
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1261
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12565
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12471
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12477
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050022
reference_id 2050022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050022
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2021-46663
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w69n-gw41-kkdv
14
url VCID-wyvr-ducu-ukfq
vulnerability_id VCID-wyvr-ducu-ukfq
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46667
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11553
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11679
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11722
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11507
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11594
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11653
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11664
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11627
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.116
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11463
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11465
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46667
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050030
reference_id 2050030
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050030
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2021-46667
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyvr-ducu-ukfq
15
url VCID-y9qz-gnth-87dt
vulnerability_id VCID-y9qz-gnth-87dt
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46662
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20169
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20317
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20376
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20099
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.2018
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20239
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20262
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20217
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20158
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20151
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20154
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20153
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050019
reference_id 2050019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050019
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
6
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
7
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
8
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
9
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2021-46662
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9qz-gnth-87dt
16
url VCID-z7ed-2j49-kfh5
vulnerability_id VCID-z7ed-2j49-kfh5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27385
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49705
published_at 2026-04-02T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49733
published_at 2026-04-04T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49684
published_at 2026-04-07T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49739
published_at 2026-04-08T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49734
published_at 2026-04-09T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49751
published_at 2026-04-11T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49723
published_at 2026-04-12T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49724
published_at 2026-04-13T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49771
published_at 2026-04-18T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49744
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27385
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075001
reference_id 2075001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075001
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
purl pkg:apk/alpine/mariadb@10.6.7-r0?arch=ppc64le&distroversion=v3.18&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main
aliases CVE-2022-27385
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7ed-2j49-kfh5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.6.7-r0%3Farch=ppc64le&distroversion=v3.18&reponame=main