Lookup for vulnerable packages by Package URL.

GET /api/packages/83250?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
    "type": "ebuild",
    "namespace": "dev-db",
    "name": "mysql",
    "version": "5.7.34",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "8.0.24",
    "latest_non_vulnerable_version": "10.2.22",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56998?format=api",
            "vulnerability_id": "VCID-11tt-44je-dfg8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80644",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80652",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80741",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80674",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8067",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80698",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80708",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80724",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80711",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80703",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80737",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80738",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14775"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890784",
                    "reference_id": "1890784",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890784"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14775"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-11tt-44je-dfg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56981?format=api",
            "vulnerability_id": "VCID-12pp-8xvj-4qc5",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14643.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14643.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56615",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56711",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56734",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56732",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5671",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56762",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56767",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56775",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56753",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56731",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5676",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14643"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865969",
                    "reference_id": "1865969",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865969"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:39Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14643"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-12pp-8xvj-4qc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56944?format=api",
            "vulnerability_id": "VCID-16hf-q2fp-3yg4",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2974.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2974.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43162",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43116",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43174",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43202",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4314",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43192",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43204",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43225",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43177",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43237",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2974"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191017-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191017-0002/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764691",
                    "reference_id": "1764691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764691"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2974",
                    "reference_id": "CVE-2019-2974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2974"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4026",
                    "reference_id": "RHSA-2020:4026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4026"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4174",
                    "reference_id": "RHSA-2020:4174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4195-1/",
                    "reference_id": "USN-4195-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4195-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4195-2/",
                    "reference_id": "USN-4195-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:06Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4195-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2019-2974"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-16hf-q2fp-3yg4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57023?format=api",
            "vulnerability_id": "VCID-187q-sxxu-zyh5",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14836",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7041",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70424",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70505",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7048",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70504",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70489",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70475",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70517",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70525",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70441",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70419",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70465",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14836"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890763",
                    "reference_id": "1890763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890763"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14836"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-187q-sxxu-zyh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57040?format=api",
            "vulnerability_id": "VCID-1vkz-z2pq-nbat",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14861"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890773",
                    "reference_id": "1890773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890773"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14861"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vkz-z2pq-nbat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57009?format=api",
            "vulnerability_id": "VCID-1vm5-s57q-5fh7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5534",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55452",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55498",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55507",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55516",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55495",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55479",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55515",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55519",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55476",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55454",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55506",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14800"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890753",
                    "reference_id": "1890753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890753"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14800"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vm5-s57q-5fh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57010?format=api",
            "vulnerability_id": "VCID-26c7-8j5m-pygt",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58885",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5896",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59027",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59006",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59026",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58989",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59023",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58982",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58948",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14804"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890754",
                    "reference_id": "1890754",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890754"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14804"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26c7-8j5m-pygt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57116?format=api",
            "vulnerability_id": "VCID-28f6-ud4w-aug9",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2934.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2934.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2934",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36828",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36891",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36908",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36862",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36985",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36887",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36922",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36914",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36899",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37019",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36848",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37354",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2934"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2020/dsa-4703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2020/dsa-4703"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851014",
                    "reference_id": "1851014",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851014"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2934",
                    "reference_id": "CVE-2020-2934",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2934"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:45Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4960",
                    "reference_id": "RHSA-2020:4960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4960"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4961",
                    "reference_id": "RHSA-2020:4961",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4961"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5134",
                    "reference_id": "RHSA-2021:5134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5134"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2934"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28f6-ud4w-aug9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57066?format=api",
            "vulnerability_id": "VCID-28fq-18k1-5ycd",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2627.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2627.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61839",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63117",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63172",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63224",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63259",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63243",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63251",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00441",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63207",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2627"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796905",
                    "reference_id": "1796905",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796905"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:03:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:03:29Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2627"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28fq-18k1-5ycd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57140?format=api",
            "vulnerability_id": "VCID-29k9-yssc-jbec",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2036"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922395",
                    "reference_id": "1922395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922395"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2036"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-29k9-yssc-jbec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57074?format=api",
            "vulnerability_id": "VCID-2eev-6ekm-2ydm",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2760.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2760.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29485",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29596",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29662",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29712",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29533",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29634",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29636",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29591",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29539",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29559",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29532",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2760"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830082",
                    "reference_id": "1830082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830082"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2760",
                    "reference_id": "CVE-2020-2760",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:P/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2760"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-08",
                    "reference_id": "GLSA-202012-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4174",
                    "reference_id": "RHSA-2020:4174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:59Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4603-1/",
                    "reference_id": "USN-4603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2760"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2eev-6ekm-2ydm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57145?format=api",
            "vulnerability_id": "VCID-2fyj-vfka-g3fc",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2046"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922398",
                    "reference_id": "1922398",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922398"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2046"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2fyj-vfka-g3fc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57151?format=api",
            "vulnerability_id": "VCID-2hqz-t746-57bt",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2060",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2060"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922402",
                    "reference_id": "1922402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922402"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2060"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2hqz-t746-57bt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57017?format=api",
            "vulnerability_id": "VCID-2sfw-7k8u-1fbk",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14827",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63748",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63809",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63872",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63863",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63827",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63844",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63861",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63875",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63835",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63793",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14827"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890759",
                    "reference_id": "1890759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890759"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14827"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2sfw-7k8u-1fbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56961?format=api",
            "vulnerability_id": "VCID-2wdv-fu9e-fkg9",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58672",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58755",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58798",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58744",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58797",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58803",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58804",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58784",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58816",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58821",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58777",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14620"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865961",
                    "reference_id": "1865961",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865961"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:07Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14620"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2wdv-fu9e-fkg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57073?format=api",
            "vulnerability_id": "VCID-2xaj-kpub-pfdt",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2759.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2759.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2759",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53285",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53392",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53308",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53334",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53356",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53385",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53369",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53406",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53412",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2759"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830048",
                    "reference_id": "1830048",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830048"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2759",
                    "reference_id": "CVE-2020-2759",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2759"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:02Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2759"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2xaj-kpub-pfdt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57014?format=api",
            "vulnerability_id": "VCID-2ytu-hw3r-ffc8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14814"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890757",
                    "reference_id": "1890757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890757"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:00Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14814"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytu-hw3r-ffc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57051?format=api",
            "vulnerability_id": "VCID-2zv1-9c2g-fkdq",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52483",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5253",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52635",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52575",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52569",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5262",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52603",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52588",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52628",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52556",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52523",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14893"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890783",
                    "reference_id": "1890783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890783"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14893"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2zv1-9c2g-fkdq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56989?format=api",
            "vulnerability_id": "VCID-3c45-ytz8-cudx",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14680.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14680.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14680",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67524",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6756",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67627",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67582",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67611",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67625",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67647",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67601",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67636",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67648",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14680"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865974",
                    "reference_id": "1865974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865974"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:07Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14680"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3c45-ytz8-cudx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56949?format=api",
            "vulnerability_id": "VCID-3f87-xwd6-uqf6",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14553.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14553.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58119",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58205",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58241",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58225",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.582",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58254",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58259",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58276",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58252",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58233",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58264",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58267",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14553"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865950",
                    "reference_id": "1865950",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865950"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:23Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14553"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3f87-xwd6-uqf6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57105?format=api",
            "vulnerability_id": "VCID-3h99-b8mf-rkcr",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43264",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43311",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4332",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43348",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43286",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43337",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43352",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43372",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43341",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43326",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43387",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43376",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2922"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835850",
                    "reference_id": "1835850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835850"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2922",
                    "reference_id": "CVE-2020-2922",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2922"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3708",
                    "reference_id": "RHSA-2019:3708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1100",
                    "reference_id": "RHSA-2020:1100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4174",
                    "reference_id": "RHSA-2020:4174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5503",
                    "reference_id": "RHSA-2020:5503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5503"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5655",
                    "reference_id": "RHSA-2020:5655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5660",
                    "reference_id": "RHSA-2020:5660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5660"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5662",
                    "reference_id": "RHSA-2020:5662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:08Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2922"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3h99-b8mf-rkcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57147?format=api",
            "vulnerability_id": "VCID-3k3d-296j-kycn",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2055"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922400",
                    "reference_id": "1922400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922400"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2055"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3k3d-296j-kycn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57057?format=api",
            "vulnerability_id": "VCID-3nu8-d5r3-6khh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2579.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2579.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64456",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6451",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64537",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64565",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64577",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64562",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64546",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64539",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64497",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72607",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73465",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73457",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2579"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796881",
                    "reference_id": "1796881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796881"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:00Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:00Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2579"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3nu8-d5r3-6khh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57112?format=api",
            "vulnerability_id": "VCID-3pme-m9qz-gfd1",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2928.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2928.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2928",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7104",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71121",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7105",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71067",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71041",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71084",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71097",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7112",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71105",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71089",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71135",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71142",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2928"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830078",
                    "reference_id": "1830078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830078"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2928",
                    "reference_id": "CVE-2020-2928",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2928"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:56Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2928"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3pme-m9qz-gfd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57139?format=api",
            "vulnerability_id": "VCID-3v1d-x9yt-3fbb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48776",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48815",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4885",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48846",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48862",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48836",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48844",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48894",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4889",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4884",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48795",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48849",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2032"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922394",
                    "reference_id": "1922394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922394"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2032"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3v1d-x9yt-3fbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57096?format=api",
            "vulnerability_id": "VCID-454s-k7hc-r7au",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2893.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2893.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65324",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65436",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65416",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65427",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65445",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65431",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65404",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6544",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65451",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2893"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830064",
                    "reference_id": "1830064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830064"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2893",
                    "reference_id": "CVE-2020-2893",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2893"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:35Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2893"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-454s-k7hc-r7au"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56965?format=api",
            "vulnerability_id": "VCID-45br-6r25-8ufz",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58672",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58755",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58798",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58744",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58797",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58803",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58804",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58784",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58816",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58821",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58777",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14624"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865963",
                    "reference_id": "1865963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865963"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:03Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14624"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45br-6r25-8ufz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57053?format=api",
            "vulnerability_id": "VCID-4d42-nuh7-6bcu",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2572.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2572.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2572",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53745",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5503",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5513",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55179",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55191",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55172",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55154",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55193",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55196",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55131",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55155",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2572"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796879",
                    "reference_id": "1796879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2572"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4d42-nuh7-6bcu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57146?format=api",
            "vulnerability_id": "VCID-4fdf-ne4n-wyc2",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54405",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54481",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5451",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54519",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54531",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54513",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54492",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5453",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54532",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54503",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54472",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54525",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2048"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922399",
                    "reference_id": "1922399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922399"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2048"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4fdf-ne4n-wyc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57003?format=api",
            "vulnerability_id": "VCID-4msq-13an-d7cb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76546",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76628",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76574",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76598",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76604",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76636",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7664",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747",
                    "reference_id": "1890747",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14789"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57042?format=api",
            "vulnerability_id": "VCID-4qvq-j6yh-ckbf",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14866",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14866"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890774",
                    "reference_id": "1890774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890774"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14866"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-j6yh-ckbf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57104?format=api",
            "vulnerability_id": "VCID-4rzj-rkuh-ffg8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2921.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2921.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49099",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49175",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49132",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49161",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49113",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49167",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49164",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49182",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49155",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49207",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49205",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2921"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830073",
                    "reference_id": "1830073",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830073"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2921",
                    "reference_id": "CVE-2020-2921",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2921"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2921"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4rzj-rkuh-ffg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57119?format=api",
            "vulnerability_id": "VCID-4zfz-7zkz-e7hn",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34706",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34914",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34814",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3494",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3482",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34864",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34892",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34896",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34859",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34836",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34875",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2002"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922380",
                    "reference_id": "1922380",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922380"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2002"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zfz-7zkz-e7hn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57061?format=api",
            "vulnerability_id": "VCID-5527-9ttk-4kgv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2588.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2588.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60359",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61664",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.617",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61615",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61645",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61616",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2588"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796884",
                    "reference_id": "1796884",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796884"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:48Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2588"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5527-9ttk-4kgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56980?format=api",
            "vulnerability_id": "VCID-5cah-ww3a-7kfv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14641.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14641.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63365",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63425",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63479",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63452",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63468",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63486",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63503",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63487",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63453",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00446",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63494",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14641"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865968",
                    "reference_id": "1865968",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865968"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:40Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14641"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cah-ww3a-7kfv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56999?format=api",
            "vulnerability_id": "VCID-5sgr-q6mn-u7gq",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76546",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76628",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76574",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76598",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76604",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76636",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7664",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743",
                    "reference_id": "1890743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14776"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57004?format=api",
            "vulnerability_id": "VCID-5ug6-v7ru-j3bv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74705",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74783",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74735",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74741",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74756",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74779",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74749",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74785",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74793",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14790"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890748",
                    "reference_id": "1890748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890748"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14790"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ug6-v7ru-j3bv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57118?format=api",
            "vulnerability_id": "VCID-66fe-xw3w-xbfh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58168",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58253",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58295",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58249",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58302",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58308",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58326",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58304",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58283",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58316",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58318",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2001"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922379",
                    "reference_id": "1922379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922379"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2001"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-66fe-xw3w-xbfh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56982?format=api",
            "vulnerability_id": "VCID-6dhz-zsur-mbdv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14651.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14651.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56615",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56711",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56734",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56732",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5671",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56762",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56767",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56775",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56753",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56731",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5676",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14651"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865982",
                    "reference_id": "1865982",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865982"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:30Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14651"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhz-zsur-mbdv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57089?format=api",
            "vulnerability_id": "VCID-6du1-tzth-k3ht",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2812.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2812.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31334",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31344",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31483",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31525",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31343",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31396",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31427",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3143",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31387",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31383",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31363",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2812"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830059",
                    "reference_id": "1830059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830059"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2812",
                    "reference_id": "CVE-2020-2812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2812"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-08",
                    "reference_id": "GLSA-202012-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4026",
                    "reference_id": "RHSA-2020:4026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4026"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4174",
                    "reference_id": "RHSA-2020:4174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:05Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4603-1/",
                    "reference_id": "USN-4603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2812"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6du1-tzth-k3ht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56959?format=api",
            "vulnerability_id": "VCID-6gcu-yxck-x3ey",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14614.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14614.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6291",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62968",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63032",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62997",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62961",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63012",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63028",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63046",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63031",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63053",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14614"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865959",
                    "reference_id": "1865959",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865959"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:14Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:14Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:14Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14614"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6gcu-yxck-x3ey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57001?format=api",
            "vulnerability_id": "VCID-6grs-76qf-jqhf",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14785"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890745",
                    "reference_id": "1890745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890745"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14785"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6grs-76qf-jqhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57056?format=api",
            "vulnerability_id": "VCID-6msr-sgew-fuf8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2577.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2577.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00243",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47579",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48948",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48964",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49018",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49014",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49031",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49004",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49055",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49051",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48983",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4901",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2577"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796880",
                    "reference_id": "1796880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796880"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:02Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2577"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6msr-sgew-fuf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57011?format=api",
            "vulnerability_id": "VCID-6w26-6psj-zubm",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14809"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890755",
                    "reference_id": "1890755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890755"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14809"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6w26-6psj-zubm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56950?format=api",
            "vulnerability_id": "VCID-6ym4-jmxp-qbbg",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14559.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14559.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14559",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.707",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70715",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70792",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70733",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7071",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70755",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70771",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70794",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70777",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70762",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00647",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70814",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14559"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865951",
                    "reference_id": "1865951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865951"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:17Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14559"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ym4-jmxp-qbbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57018?format=api",
            "vulnerability_id": "VCID-6z2t-rt9t-wydy",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14828",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76309",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7628",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76306",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76284",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76279",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7632",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76325",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76254",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76234",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76266",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14828"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890760",
                    "reference_id": "1890760",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890760"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14828"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6z2t-rt9t-wydy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57032?format=api",
            "vulnerability_id": "VCID-71bd-rm5x-cud8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14848"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890770",
                    "reference_id": "1890770",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890770"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14848"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-71bd-rm5x-cud8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56955?format=api",
            "vulnerability_id": "VCID-7gfu-mf9q-g3gx",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14576.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14576.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70987",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70997",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71071",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71015",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7099",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71032",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71047",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7107",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71055",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71037",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71084",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00658",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71091",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14576"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865955",
                    "reference_id": "1865955",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865955"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:58Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14576"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gfu-mf9q-g3gx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57024?format=api",
            "vulnerability_id": "VCID-7jj8-tenv-zub1",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14837"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890764",
                    "reference_id": "1890764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890764"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14837"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jj8-tenv-zub1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57098?format=api",
            "vulnerability_id": "VCID-7ruf-mz2x-6uaz",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2896.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2896.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2896",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65324",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65436",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65416",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65427",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65445",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65431",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65404",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6544",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65451",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2896"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830067",
                    "reference_id": "1830067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830067"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2896",
                    "reference_id": "CVE-2020-2896",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2896"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:31Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2896"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ruf-mz2x-6uaz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56984?format=api",
            "vulnerability_id": "VCID-7zra-1j2r-sqhx",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14654.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14654.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58672",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58755",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58798",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58744",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58797",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58803",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58804",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58784",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58816",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58821",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58777",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14654"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865970",
                    "reference_id": "1865970",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865970"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:27Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14654"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7zra-1j2r-sqhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57071?format=api",
            "vulnerability_id": "VCID-8fx7-rydt-nydd",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2694.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2694.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5498",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55082",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55127",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55106",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55132",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55144",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55124",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55148",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2694"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796889",
                    "reference_id": "1796889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796889"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:39Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2694"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fx7-rydt-nydd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57132?format=api",
            "vulnerability_id": "VCID-8h4m-83xa-m7df",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97882",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97887",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9791",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97888",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97891",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97895",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97898",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97901",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97902",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97903",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97911",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2021"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922388",
                    "reference_id": "1922388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922388"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2021"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4m-83xa-m7df"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56991?format=api",
            "vulnerability_id": "VCID-8hkm-7z6b-p7a3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14702.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14702.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49963",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50001",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50033",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49979",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50034",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50027",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50045",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50017",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50014",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50059",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50061",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00265",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50028",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14702"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865976",
                    "reference_id": "1865976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865976"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:24Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14702"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8hkm-7z6b-p7a3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57058?format=api",
            "vulnerability_id": "VCID-8sng-6dfg-yfa9",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2580.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2580.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2580",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60638",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61858",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61888",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61859",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61908",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61924",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61945",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61934",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61913",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61957",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61961",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61784",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2580"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796882",
                    "reference_id": "1796882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796882"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2580"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8sng-6dfg-yfa9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56960?format=api",
            "vulnerability_id": "VCID-8u32-x538-h3d7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67746",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6778",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67849",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.678",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67781",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67832",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67846",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67856",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67819",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67855",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67868",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14619"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865960",
                    "reference_id": "1865960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865960"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:08Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14619"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8u32-x538-h3d7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57054?format=api",
            "vulnerability_id": "VCID-8u69-g2m8-e3eh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2573.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2573.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2573",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7188",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71888",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71948",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71907",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71879",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71918",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71929",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71953",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71936",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71959",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71963",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2573"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798576",
                    "reference_id": "1798576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798576"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:05Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2573"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8u69-g2m8-e3eh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56947?format=api",
            "vulnerability_id": "VCID-9e62-4r97-a7b6",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14547.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14547.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53285",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53308",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53392",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53334",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53356",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53385",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53369",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53406",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53412",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14547"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865948",
                    "reference_id": "1865948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865948"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:36Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14547"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9e62-4r97-a7b6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57045?format=api",
            "vulnerability_id": "VCID-9nry-61xw-cug4",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14869"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890777",
                    "reference_id": "1890777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890777"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14869"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9nry-61xw-cug4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57052?format=api",
            "vulnerability_id": "VCID-9pzq-dxgg-e7gv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2570.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2570.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2570",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52582",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52626",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52712",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52664",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52714",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52697",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52682",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52721",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52728",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52652",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52619",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00294",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52669",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2570"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798559",
                    "reference_id": "1798559",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798559"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:13Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2570"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9pzq-dxgg-e7gv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57027?format=api",
            "vulnerability_id": "VCID-9ycb-mjma-7qfv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14839"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890766",
                    "reference_id": "1890766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890766"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14839"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ycb-mjma-7qfv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56951?format=api",
            "vulnerability_id": "VCID-a8ss-rpq3-j3ez",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14564",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42914",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42931",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42929",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42989",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42976",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42861",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42958",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42896",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42946",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42981",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14564"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14564"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a8ss-rpq3-j3ez"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57000?format=api",
            "vulnerability_id": "VCID-aaq9-6yhn-afbx",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14777",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14777"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890744",
                    "reference_id": "1890744",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890744"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14777"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aaq9-6yhn-afbx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57020?format=api",
            "vulnerability_id": "VCID-aczd-32sa-fffg",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14829"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890761",
                    "reference_id": "1890761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890761"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14829"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aczd-32sa-fffg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57085?format=api",
            "vulnerability_id": "VCID-aeg6-jvdz-7fh2",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2790.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2790.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64507",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64622",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64561",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64589",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64547",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64596",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64612",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6463",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64617",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64624",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64636",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2790"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:24Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830057",
                    "reference_id": "1830057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830057"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2790",
                    "reference_id": "CVE-2020-2790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2790"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2790"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aeg6-jvdz-7fh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56948?format=api",
            "vulnerability_id": "VCID-b4kn-wdpj-a3dm",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14550.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14550.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73789",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73799",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73885",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73822",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73792",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73839",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73861",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73843",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73835",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00788",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73877",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14550"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865949",
                    "reference_id": "1865949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865949"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/",
                    "reference_id": "ntap-20210622-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210622-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1258",
                    "reference_id": "RHSA-2019:1258",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1258"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2327",
                    "reference_id": "RHSA-2019:2327",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:32Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14550"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4kn-wdpj-a3dm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57059?format=api",
            "vulnerability_id": "VCID-b67d-16a1-b3at",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2584.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2584.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64926",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65972",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66059",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66071",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66077",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66047",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66082",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66096",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66014",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66043",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6601",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2584"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796883",
                    "reference_id": "1796883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796883"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:52Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2584"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b67d-16a1-b3at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57126?format=api",
            "vulnerability_id": "VCID-c1gb-f47t-2fha",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2012.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2012.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2012",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2012"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922422",
                    "reference_id": "1922422",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922422"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2012"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c1gb-f47t-2fha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57137?format=api",
            "vulnerability_id": "VCID-c6rw-mujf-qqbj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2030"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922392",
                    "reference_id": "1922392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922392"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2030"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6rw-mujf-qqbj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56978?format=api",
            "vulnerability_id": "VCID-cd89-a3te-cyfv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14634.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14634.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48255",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48334",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48275",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48227",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48283",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48277",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48302",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48276",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48288",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48339",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14634"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865967",
                    "reference_id": "1865967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865967"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:52Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14634"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cd89-a3te-cyfv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57153?format=api",
            "vulnerability_id": "VCID-ch22-5f87-tfhw",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2061",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2061"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922403",
                    "reference_id": "1922403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922403"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2061"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ch22-5f87-tfhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56954?format=api",
            "vulnerability_id": "VCID-cqpn-sgg6-4khh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14575.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14575.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62543",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62601",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62681",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62634",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62599",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62649",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62666",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62684",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62674",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62651",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62691",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62699",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14575"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865954",
                    "reference_id": "1865954",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865954"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:00Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14575"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cqpn-sgg6-4khh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57043?format=api",
            "vulnerability_id": "VCID-cr9r-v269-7qan",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14867"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890775",
                    "reference_id": "1890775",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890775"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14867"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr9r-v269-7qan"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56987?format=api",
            "vulnerability_id": "VCID-d5hc-4qz5-3uag",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77954",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77961",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78038",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7799",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77971",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77998",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78002",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78029",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78012",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78011",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78046",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78045",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14672"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890737",
                    "reference_id": "1890737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890737"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14672"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5hc-4qz5-3uag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57162?format=api",
            "vulnerability_id": "VCID-d5js-9kvw-dyf9",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2122"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922411",
                    "reference_id": "1922411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922411"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2122"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5js-9kvw-dyf9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57028?format=api",
            "vulnerability_id": "VCID-da5g-ea4u-qfeh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14844"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890767",
                    "reference_id": "1890767",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890767"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14844"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-da5g-ea4u-qfeh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57005?format=api",
            "vulnerability_id": "VCID-dcyd-xspe-q7eh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62004",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62063",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62155",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62095",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62064",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62114",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62132",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62152",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62141",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6212",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62164",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6217",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14791"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890749",
                    "reference_id": "1890749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890749"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14791"
            ],
            "risk_score": 1.0,
            "exploitability": "0.5",
            "weighted_severity": "2.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyd-xspe-q7eh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57067?format=api",
            "vulnerability_id": "VCID-dgx8-xnbw-4bdy",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2660.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2660.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60359",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61664",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.617",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61615",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61645",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61616",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2660"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796886",
                    "reference_id": "1796886",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796886"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:29Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2660"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgx8-xnbw-4bdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57141?format=api",
            "vulnerability_id": "VCID-dsp1-f2v8-z7fb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2038"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922396",
                    "reference_id": "1922396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922396"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2038"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dsp1-f2v8-z7fb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57128?format=api",
            "vulnerability_id": "VCID-e1p7-4g2g-wuac",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2016.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2016.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5765",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57735",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57763",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57756",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57729",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57784",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57787",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57803",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57781",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5776",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00354",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57789",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2016"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922420",
                    "reference_id": "1922420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922420"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2016"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e1p7-4g2g-wuac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56993?format=api",
            "vulnerability_id": "VCID-e3qg-3jxq-ukeb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14760.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14760.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31966",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32094",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31951",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32007",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32037",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3204",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32001",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31968",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31978",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32133",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31956",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14760"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890735",
                    "reference_id": "1890735",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890735"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14760"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e3qg-3jxq-ukeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57163?format=api",
            "vulnerability_id": "VCID-eakf-rhk4-m3g8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22592",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22613",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22765",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22809",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.226",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22675",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22726",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22746",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22707",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2265",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22666",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22662",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2154"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951752",
                    "reference_id": "1951752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951752"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428",
                    "reference_id": "988428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-14",
                    "reference_id": "ASA-202105-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1882",
                    "reference_id": "AVG-1882",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1882"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/",
                    "reference_id": "DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/",
                    "reference_id": "GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-28",
                    "reference_id": "GLSA-202105-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-28"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/",
                    "reference_id": "PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2154"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eakf-rhk4-m3g8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57156?format=api",
            "vulnerability_id": "VCID-eh72-pgfd-x3dy",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2070"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922405",
                    "reference_id": "1922405",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922405"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2070"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eh72-pgfd-x3dy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56996?format=api",
            "vulnerability_id": "VCID-ert5-smsw-1ba2",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45237",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45319",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45327",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45339",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4536",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45329",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4533",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45381",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45377",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4534",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45283",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14771"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890740",
                    "reference_id": "1890740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890740"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14771"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ert5-smsw-1ba2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56946?format=api",
            "vulnerability_id": "VCID-fv24-tu6p-17fj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14540.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14540.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65324",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65436",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65416",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65427",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65445",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65431",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65404",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6544",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65451",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14540"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865947",
                    "reference_id": "1865947",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865947"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:50Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14540"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fv24-tu6p-17fj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56992?format=api",
            "vulnerability_id": "VCID-fyxd-xzv7-jkgv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14725.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14725.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59027",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58948",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59006",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59026",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58989",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59023",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61888",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61784",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61858",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14725"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865977",
                    "reference_id": "1865977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865977"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200731-0006/",
                    "reference_id": "ntap-20200731-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:36Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200731-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14725"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fyxd-xzv7-jkgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57034?format=api",
            "vulnerability_id": "VCID-fz6n-wrp4-2udn",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14853",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45193",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45186",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45226",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45194",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45196",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45248",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45242",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45105",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45208",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45205",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14853"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14853"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fz6n-wrp4-2udn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57160?format=api",
            "vulnerability_id": "VCID-g58r-8vcn-bfea",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25815",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25615",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25747",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25757",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25717",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25661",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25644",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25858",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25627",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.257",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2087"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922408",
                    "reference_id": "1922408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922408"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2087"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g58r-8vcn-bfea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57097?format=api",
            "vulnerability_id": "VCID-gd99-z617-n3h8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2895.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2895.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2895",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65324",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65436",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65416",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65427",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65445",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65431",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65404",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6544",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65451",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2895"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830066",
                    "reference_id": "1830066",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830066"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2895",
                    "reference_id": "CVE-2020-2895",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2895"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:32Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2895"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gd99-z617-n3h8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57117?format=api",
            "vulnerability_id": "VCID-getz-u39m-ubgv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-1998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51073",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51126",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51107",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51163",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51159",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51204",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51182",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51168",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51207",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51213",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-1998"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922378",
                    "reference_id": "1922378",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922378"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-1998"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-getz-u39m-ubgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57082?format=api",
            "vulnerability_id": "VCID-gf34-43aa-d3gj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2774.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2774.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61495",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61654",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6157",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61599",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61569",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61617",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61632",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61653",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61642",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61622",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61664",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61669",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2774"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830054",
                    "reference_id": "1830054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830054"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2774",
                    "reference_id": "CVE-2020-2774",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2774"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2774"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gf34-43aa-d3gj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57086?format=api",
            "vulnerability_id": "VCID-gkdp-dtuv-nuf8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2804.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2804.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76738",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76835",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76742",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7677",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76752",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76783",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76794",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76823",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76803",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76795",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76838",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76843",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2804"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830058",
                    "reference_id": "1830058",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830058"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2804",
                    "reference_id": "CVE-2020-2804",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2804"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:14Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2804"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gkdp-dtuv-nuf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57136?format=api",
            "vulnerability_id": "VCID-gmxv-dxp3-cuhq",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2028"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922391",
                    "reference_id": "1922391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922391"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2028"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmxv-dxp3-cuhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57064?format=api",
            "vulnerability_id": "VCID-gqsy-vngu-8fa5",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2589.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2589.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2589",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56973",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58173",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58307",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58313",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58331",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58308",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58288",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5832",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58323",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58279",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58253",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2589"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796885",
                    "reference_id": "1796885",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796885"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:46Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2589"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqsy-vngu-8fa5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56986?format=api",
            "vulnerability_id": "VCID-gt3h-mfuf-53ew",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14663.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14663.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71544",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71551",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71542",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71582",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71616",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.716",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71581",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71626",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71631",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71569",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14663"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865972",
                    "reference_id": "1865972",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865972"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:52Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14663"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gt3h-mfuf-53ew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57026?format=api",
            "vulnerability_id": "VCID-h2r2-p8v7-sfc6",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48171",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4824",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48235",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48229",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48254",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48239",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4829",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48285",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48228",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48179",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14838"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890765",
                    "reference_id": "1890765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890765"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14838"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2r2-p8v7-sfc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56957?format=api",
            "vulnerability_id": "VCID-h7qz-5f8y-4bd7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14591.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14591.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64089",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64145",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64207",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64132",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64183",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64199",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64212",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64201",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64173",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64208",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64219",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64172",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14591"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865957",
                    "reference_id": "1865957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865957"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:39Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14591"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qz-5f8y-4bd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57008?format=api",
            "vulnerability_id": "VCID-hjkk-adkv-yfdu",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46097",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46137",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4616",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46161",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46182",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46153",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46162",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4622",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46216",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46158",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46105",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14799"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890752",
                    "reference_id": "1890752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890752"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14799"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkk-adkv-yfdu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56997?format=api",
            "vulnerability_id": "VCID-hrbc-2cpw-5be7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14773"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890742",
                    "reference_id": "1890742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890742"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14773"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hrbc-2cpw-5be7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56958?format=api",
            "vulnerability_id": "VCID-hwm3-w4vk-q3c7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14597.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14597.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62543",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62601",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62681",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62634",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62599",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62649",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62666",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62684",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62674",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62651",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62691",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62699",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14597"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865958",
                    "reference_id": "1865958",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865958"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:31Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14597"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hwm3-w4vk-q3c7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57021?format=api",
            "vulnerability_id": "VCID-jate-mc8k-13gn",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70779",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70794",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7087",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70847",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70838",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70885",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70891",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70812",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70787",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70831",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14830"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890762",
                    "reference_id": "1890762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890762"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14830"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jate-mc8k-13gn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57084?format=api",
            "vulnerability_id": "VCID-jrj5-82ey-3fhy",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69623",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69721",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69635",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69651",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69629",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6968",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69697",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69719",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69705",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69691",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69731",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6974",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2780"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830056",
                    "reference_id": "1830056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830056"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2780",
                    "reference_id": "CVE-2020-2780",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2780"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4026",
                    "reference_id": "RHSA-2020:4026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4026"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4174",
                    "reference_id": "RHSA-2020:4174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:33Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2780"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jrj5-82ey-3fhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57101?format=api",
            "vulnerability_id": "VCID-jt7v-kaph-xkfm",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2901.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2901.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6202",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62169",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62079",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62111",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6213",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62148",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62167",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62156",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62179",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62184",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2901"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830070",
                    "reference_id": "1830070",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830070"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2901",
                    "reference_id": "CVE-2020-2901",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2901"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:23Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2901"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jt7v-kaph-xkfm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57031?format=api",
            "vulnerability_id": "VCID-k4fk-qkr8-1uac",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70779",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70794",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7087",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70847",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70838",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70885",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70891",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70812",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70787",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70831",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14846"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890769",
                    "reference_id": "1890769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890769"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14846"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4fk-qkr8-1uac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56945?format=api",
            "vulnerability_id": "VCID-k5ud-qnrb-5ufj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14539.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14539.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75442",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75445",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75533",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75477",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75457",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75499",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75509",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75528",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75506",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75496",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75538",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75544",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14539"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865945",
                    "reference_id": "1865945",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865945"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:52Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14539"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k5ud-qnrb-5ufj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57131?format=api",
            "vulnerability_id": "VCID-kjbh-uhvg-b7am",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2020.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2020.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82558",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82573",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82668",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82588",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82584",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8261",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82618",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82636",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82631",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82664",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01766",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82665",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2020"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922387",
                    "reference_id": "1922387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922387"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2020"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kjbh-uhvg-b7am"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57138?format=api",
            "vulnerability_id": "VCID-kwfb-kbpq-pkck",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2031"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922393",
                    "reference_id": "1922393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922393"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2031"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfb-kbpq-pkck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57158?format=api",
            "vulnerability_id": "VCID-m2ey-feyg-ufb7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2076"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922407",
                    "reference_id": "1922407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922407"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2076"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2ey-feyg-ufb7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57070?format=api",
            "vulnerability_id": "VCID-m2x9-xa7p-vbhp",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2686.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2686.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54679",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56027",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56187",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56192",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56202",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56178",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56163",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56196",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56198",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56136",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56156",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2686"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796888",
                    "reference_id": "1796888",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796888"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:51Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:51Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2686"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2x9-xa7p-vbhp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57100?format=api",
            "vulnerability_id": "VCID-mg5t-q2uj-4ud1",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2898.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2898.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58931",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59074",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59007",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59029",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59046",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59053",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59035",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59069",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2898"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830069",
                    "reference_id": "1830069",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830069"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2898",
                    "reference_id": "CVE-2020-2898",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2898"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:27Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2898"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mg5t-q2uj-4ud1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57165?format=api",
            "vulnerability_id": "VCID-muzn-dqpe-q7cr",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89091",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89099",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89113",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89116",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89134",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89139",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89146",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89157",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2180"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951762",
                    "reference_id": "1951762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951762"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-28",
                    "reference_id": "GLSA-202105-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-28"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2180"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-muzn-dqpe-q7cr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57125?format=api",
            "vulnerability_id": "VCID-my1q-4m9d-9fgj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84153",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84167",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8425",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84223",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84185",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84186",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84208",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84214",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84232",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84226",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84245",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84244",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2011"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922384",
                    "reference_id": "1922384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922384"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/",
                    "reference_id": "ntap-20210622-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210622-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2327",
                    "reference_id": "RHSA-2019:2327",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2011"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-my1q-4m9d-9fgj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57161?format=api",
            "vulnerability_id": "VCID-n9r2-crxf-jfh7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2088",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25815",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25615",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25747",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25757",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25717",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25661",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25644",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25858",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25627",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.257",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2088"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922410",
                    "reference_id": "1922410",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922410"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2088"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n9r2-crxf-jfh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57015?format=api",
            "vulnerability_id": "VCID-ndhs-j4q8-zkf8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14821"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890758",
                    "reference_id": "1890758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890758"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14821"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ndhs-j4q8-zkf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57114?format=api",
            "vulnerability_id": "VCID-ngf5-739w-tbe4",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2930.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2930.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2930",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62543",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62681",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62601",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62634",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62599",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62649",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62666",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62684",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62674",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62651",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62691",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62699",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2930"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830079",
                    "reference_id": "1830079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830079"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2930",
                    "reference_id": "CVE-2020-2930",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2930"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:55Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2930"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngf5-739w-tbe4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57030?format=api",
            "vulnerability_id": "VCID-njkb-a6xx-wke9",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14845"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890768",
                    "reference_id": "1890768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890768"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14845"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njkb-a6xx-wke9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57076?format=api",
            "vulnerability_id": "VCID-nrzc-hfjh-wban",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2762.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2762.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2762",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58931",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59074",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59007",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59029",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59046",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59053",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59035",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59069",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2762"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830050",
                    "reference_id": "1830050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830050"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2762",
                    "reference_id": "CVE-2020-2762",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2762"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:56Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2762"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nrzc-hfjh-wban"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57148?format=api",
            "vulnerability_id": "VCID-p15d-cz1g-hucw",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2056"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922419",
                    "reference_id": "1922419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922419"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2056"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p15d-cz1g-hucw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57044?format=api",
            "vulnerability_id": "VCID-pawh-67dd-xbay",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14868"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890776",
                    "reference_id": "1890776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890776"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:10Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14868"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pawh-67dd-xbay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56995?format=api",
            "vulnerability_id": "VCID-pfkc-qtn3-skgp",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80644",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80652",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80741",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80674",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8067",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80698",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80708",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80724",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80711",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80703",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80737",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80738",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14769"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890739",
                    "reference_id": "1890739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890739"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14769"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pfkc-qtn3-skgp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56994?format=api",
            "vulnerability_id": "VCID-pmhc-1rhq-gfeb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82525",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82539",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82629",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82554",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8255",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82576",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82584",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82602",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82596",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82589",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82626",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738",
                    "reference_id": "1890738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14765"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57037?format=api",
            "vulnerability_id": "VCID-ptkb-y547-skg4",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40685",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40769",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40681",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40779",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40798",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40763",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40745",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40789",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40759",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40796",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40722",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40772",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14860"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890772",
                    "reference_id": "1890772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890772"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14860"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkb-y547-skg4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57012?format=api",
            "vulnerability_id": "VCID-qe1p-f4h5-uyga",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80331",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80338",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80417",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80347",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80376",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80386",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80405",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8039",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80412",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80413",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756",
                    "reference_id": "1890756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14812"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57083?format=api",
            "vulnerability_id": "VCID-qg23-z7ps-73fc",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2779.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2779.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69781",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69873",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69809",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69785",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69833",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69848",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69871",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69856",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69842",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69884",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69893",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2779"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830055",
                    "reference_id": "1830055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830055"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2779",
                    "reference_id": "CVE-2020-2779",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2779"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2779"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qg23-z7ps-73fc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57007?format=api",
            "vulnerability_id": "VCID-qrcr-rtqs-f3g7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14794"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890751",
                    "reference_id": "1890751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890751"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14794"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qrcr-rtqs-f3g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57095?format=api",
            "vulnerability_id": "VCID-qx9m-18q8-n3cb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2892.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2892.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2892",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58931",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59074",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59007",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59029",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59046",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59053",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59035",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59069",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2892"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830062",
                    "reference_id": "1830062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830062"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2892",
                    "reference_id": "CVE-2020-2892",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2892"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:37Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2892"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qx9m-18q8-n3cb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57033?format=api",
            "vulnerability_id": "VCID-r6xq-en8s-u3db",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14852"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890771",
                    "reference_id": "1890771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890771"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14852"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r6xq-en8s-u3db"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56985?format=api",
            "vulnerability_id": "VCID-r8yq-ybgw-wkd4",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14656.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14656.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58672",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58755",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58798",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58744",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58797",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58803",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58804",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58784",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58816",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58821",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58777",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14656"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865971",
                    "reference_id": "1865971",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865971"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:24Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14656"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8yq-ybgw-wkd4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57081?format=api",
            "vulnerability_id": "VCID-re6h-anrv-cfg1",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2770.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2770.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71199",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71279",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71226",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71243",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71257",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7128",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71249",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71295",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71301",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2770"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830053",
                    "reference_id": "1830053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830053"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2770",
                    "reference_id": "CVE-2020-2770",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2770"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2770"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-re6h-anrv-cfg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57133?format=api",
            "vulnerability_id": "VCID-rf1r-a5xx-akb3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64986",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65036",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65098",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65064",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65025",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65075",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65088",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65107",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65096",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65068",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65105",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65114",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389",
                    "reference_id": "1922389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2022"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56956?format=api",
            "vulnerability_id": "VCID-rfdc-qbz3-33as",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14586.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14586.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54167",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54187",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54273",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54217",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54245",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5424",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5429",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54272",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5425",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54289",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54294",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14586"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865956",
                    "reference_id": "1865956",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865956"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:45Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14586"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfdc-qbz3-33as"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57093?format=api",
            "vulnerability_id": "VCID-rgwn-3dvd-9yd6",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2853.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2853.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2853",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71199",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71279",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71226",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71243",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71257",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7128",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71249",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71295",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71301",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2853"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830061",
                    "reference_id": "1830061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830061"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2853",
                    "reference_id": "CVE-2020-2853",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2853"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2853"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgwn-3dvd-9yd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56988?format=api",
            "vulnerability_id": "VCID-ru7n-ys7q-7fc1",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14678.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14678.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71544",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71551",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71542",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71582",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71616",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.716",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71581",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71626",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71631",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71569",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14678"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865973",
                    "reference_id": "1865973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865973"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:44Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14678"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ru7n-ys7q-7fc1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57103?format=api",
            "vulnerability_id": "VCID-sbak-359j-afdc",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2904.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2904.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2904",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65324",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65436",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65416",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65427",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65445",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65431",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65404",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6544",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65451",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2904"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830072",
                    "reference_id": "1830072",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830072"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2904",
                    "reference_id": "CVE-2020-2904",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2904"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:19Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2904"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sbak-359j-afdc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57069?format=api",
            "vulnerability_id": "VCID-sddw-fre1-53dt",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2679.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2679.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60359",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61664",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.617",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61615",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61645",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61616",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2679"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796887",
                    "reference_id": "1796887",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796887"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:02Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2679"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sddw-fre1-53dt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57143?format=api",
            "vulnerability_id": "VCID-sq21-9e5z-muhb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27967",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28039",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27832",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27983",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27986",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27944",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27885",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27894",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27875",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28081",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27876",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27942",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2042"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922397",
                    "reference_id": "1922397",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922397"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2042"
            ],
            "risk_score": 1.1,
            "exploitability": "0.5",
            "weighted_severity": "2.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sq21-9e5z-muhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57048?format=api",
            "vulnerability_id": "VCID-sruz-agx3-3feq",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75569",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75571",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75652",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75615",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7565",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75632",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75663",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75667",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75601",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75581",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14878"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890780",
                    "reference_id": "1890780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890780"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:53:51Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14878"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sruz-agx3-3feq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57091?format=api",
            "vulnerability_id": "VCID-sutj-xqjr-puee",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2814.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2814.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3169",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3184",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31709",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31884",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31703",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31755",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31785",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31788",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31748",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31713",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31744",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31722",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2814"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830060",
                    "reference_id": "1830060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830060"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2814",
                    "reference_id": "CVE-2020-2814",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2814"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-08",
                    "reference_id": "GLSA-202012-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:04:01Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4174",
                    "reference_id": "RHSA-2020:4174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4603-1/",
                    "reference_id": "USN-4603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2814"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sutj-xqjr-puee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57046?format=api",
            "vulnerability_id": "VCID-swdu-cgp2-77e4",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14870"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890778",
                    "reference_id": "1890778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890778"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14870"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-swdu-cgp2-77e4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57002?format=api",
            "vulnerability_id": "VCID-t31g-7742-fqhk",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14786"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890746",
                    "reference_id": "1890746",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890746"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14786"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t31g-7742-fqhk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57157?format=api",
            "vulnerability_id": "VCID-td7w-db1k-t3g3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2072"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922406",
                    "reference_id": "1922406",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922406"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2072"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-td7w-db1k-t3g3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57154?format=api",
            "vulnerability_id": "VCID-teu1-w449-fkcx",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2065"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922404",
                    "reference_id": "1922404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922404"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2065"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teu1-w449-fkcx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57075?format=api",
            "vulnerability_id": "VCID-tmkk-qvgc-43c2",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2761.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2761.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2761",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71199",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71279",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71226",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71243",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71257",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7128",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71249",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71295",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71301",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2761"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830049",
                    "reference_id": "1830049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830049"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2761",
                    "reference_id": "CVE-2020-2761",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2761"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:58Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2761"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmkk-qvgc-43c2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57072?format=api",
            "vulnerability_id": "VCID-tp8f-vv6a-j7fb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2752.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2752.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2752",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45795",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45663",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45728",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45748",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45697",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45753",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45772",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45742",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.458",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2752"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835849",
                    "reference_id": "1835849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835849"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2752",
                    "reference_id": "CVE-2020-2752",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2752"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-08",
                    "reference_id": "GLSA-202012-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4026",
                    "reference_id": "RHSA-2020:4026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4026"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4174",
                    "reference_id": "RHSA-2020:4174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5503",
                    "reference_id": "RHSA-2020:5503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5503"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5655",
                    "reference_id": "RHSA-2020:5655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5660",
                    "reference_id": "RHSA-2020:5660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5660"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5662",
                    "reference_id": "RHSA-2020:5662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4603-1/",
                    "reference_id": "USN-4603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2752"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tp8f-vv6a-j7fb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57134?format=api",
            "vulnerability_id": "VCID-tudj-guxj-53ea",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7041",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70424",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70505",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7048",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70504",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70489",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70475",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70517",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70525",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70441",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70419",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70465",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2024"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922390",
                    "reference_id": "1922390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922390"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2024"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tudj-guxj-53ea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57050?format=api",
            "vulnerability_id": "VCID-tv36-3tsk-uket",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14891"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890782",
                    "reference_id": "1890782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890782"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14891"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tv36-3tsk-uket"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57110?format=api",
            "vulnerability_id": "VCID-u2pz-1zwj-zye3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2925.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2925.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53285",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53392",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53308",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53334",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53356",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53385",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53369",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53406",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53412",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2925"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830076",
                    "reference_id": "1830076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830076"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2925",
                    "reference_id": "CVE-2020-2925",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2925"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:03Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2925"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u2pz-1zwj-zye3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57094?format=api",
            "vulnerability_id": "VCID-u33b-3n5s-4qfv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2875.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2875.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71745",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71816",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71753",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71771",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71746",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71785",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71796",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7182",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71803",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71828",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71833",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2875"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2020/dsa-4703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2020/dsa-4703"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851019",
                    "reference_id": "1851019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851019"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2875",
                    "reference_id": "CVE-2020-2875",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2875"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:02:06Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4960",
                    "reference_id": "RHSA-2020:4960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4960"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4961",
                    "reference_id": "RHSA-2020:4961",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4961"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5134",
                    "reference_id": "RHSA-2021:5134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5134"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2875"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u33b-3n5s-4qfv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57106?format=api",
            "vulnerability_id": "VCID-u7pr-ex15-uyhv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2923.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2923.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65324",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65436",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65416",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65427",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65445",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65431",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65404",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6544",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65451",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2923"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830074",
                    "reference_id": "1830074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830074"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2923",
                    "reference_id": "CVE-2020-2923",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2923"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:06Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2923"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u7pr-ex15-uyhv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57115?format=api",
            "vulnerability_id": "VCID-ucu7-scqc-nkcc",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2933.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2933.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72739",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7265",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72667",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72645",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72684",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72697",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72721",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72704",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72694",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72736",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72747",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2875"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2933"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2934"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00015.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QDR2WOUETBT76WAO5NNCCXSAM3AGG3D/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDKQVPFT4Z4SFPBH6YNFMJOXKS2YYKHA/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2020/dsa-4703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2020/dsa-4703"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851022",
                    "reference_id": "1851022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851022"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2933",
                    "reference_id": "CVE-2020-2933",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2933"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4960",
                    "reference_id": "RHSA-2020:4960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4960"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4961",
                    "reference_id": "RHSA-2020:4961",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4961"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2933"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucu7-scqc-nkcc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56943?format=api",
            "vulnerability_id": "VCID-upmt-kdja-37fj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2938.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2938.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2938",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24863",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24952",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2507",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24845",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24913",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24959",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24974",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24934",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24879",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24893",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24886",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2938"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191017-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191017-0002/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764680",
                    "reference_id": "1764680",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764680"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2938",
                    "reference_id": "CVE-2019-2938",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2938"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4174",
                    "reference_id": "RHSA-2020:4174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4195-1/",
                    "reference_id": "USN-4195-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4195-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4195-2/",
                    "reference_id": "USN-4195-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:59Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4195-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2019-2938"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upmt-kdja-37fj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57159?format=api",
            "vulnerability_id": "VCID-uzvh-tvvx-vyer",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2081"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922416",
                    "reference_id": "1922416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922416"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2081"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzvh-tvvx-vyer"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57127?format=api",
            "vulnerability_id": "VCID-v543-uhu7-afay",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2014.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2014.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2014"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922385",
                    "reference_id": "1922385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922385"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2014"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v543-uhu7-afay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57087?format=api",
            "vulnerability_id": "VCID-v7cn-tz6z-53hw",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2806.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2806.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64507",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64622",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64561",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64589",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64547",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64596",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64612",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6463",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64617",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64624",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64636",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2806"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:13Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:13Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830081",
                    "reference_id": "1830081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830081"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2806",
                    "reference_id": "CVE-2020-2806",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2806"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2806"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v7cn-tz6z-53hw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57006?format=api",
            "vulnerability_id": "VCID-vap7-ycjn-73d1",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74705",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74783",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74735",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74741",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74756",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74779",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74749",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74785",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74793",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14793"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890750",
                    "reference_id": "1890750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890750"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14793"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vap7-ycjn-73d1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57122?format=api",
            "vulnerability_id": "VCID-vcyx-58nm-gbba",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67187",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67287",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6726",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67248",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67225",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67276",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67289",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67309",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67296",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67308",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67295",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2007"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922382",
                    "reference_id": "1922382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922382"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/",
                    "reference_id": "ntap-20210622-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210622-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3708",
                    "reference_id": "RHSA-2019:3708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1100",
                    "reference_id": "RHSA-2020:1100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5503",
                    "reference_id": "RHSA-2020:5503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5503"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5655",
                    "reference_id": "RHSA-2020:5655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5660",
                    "reference_id": "RHSA-2020:5660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5660"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5662",
                    "reference_id": "RHSA-2020:5662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2007"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vcyx-58nm-gbba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57099?format=api",
            "vulnerability_id": "VCID-vddh-dtqh-bqay",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2897.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2897.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65324",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65436",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65398",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65416",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65427",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65445",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65431",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65404",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6544",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65451",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2897"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830068",
                    "reference_id": "1830068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830068"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2897",
                    "reference_id": "CVE-2020-2897",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2897"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:29Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2897"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vddh-dtqh-bqay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57108?format=api",
            "vulnerability_id": "VCID-vket-6cdn-e7bx",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2924.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2924.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53285",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53392",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53308",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53334",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53356",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53385",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53369",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53406",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53412",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2924"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830075",
                    "reference_id": "1830075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830075"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2924",
                    "reference_id": "CVE-2020-2924",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2924"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:05Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2924"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vket-6cdn-e7bx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57102?format=api",
            "vulnerability_id": "VCID-vxuu-tf8e-bkcz",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2903.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2903.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53285",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53392",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53308",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53334",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53356",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53385",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53369",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53406",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53412",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2903"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830071",
                    "reference_id": "1830071",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830071"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2903",
                    "reference_id": "CVE-2020-2903",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2903"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:21Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2903"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vxuu-tf8e-bkcz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57124?format=api",
            "vulnerability_id": "VCID-w93s-7t77-x3fg",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58354",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58439",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58483",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58458",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58432",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58485",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58508",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58488",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58469",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58501",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58505",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2010"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922383",
                    "reference_id": "1922383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922383"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/",
                    "reference_id": "ntap-20210622-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210622-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2010"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w93s-7t77-x3fg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57111?format=api",
            "vulnerability_id": "VCID-wfqc-j2nq-x7bw",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2926.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2926.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2926",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46782",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46845",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4682",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46839",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46788",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46842",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46865",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46837",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46844",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.469",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46897",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2926"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830077",
                    "reference_id": "1830077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830077"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2926",
                    "reference_id": "CVE-2020-2926",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2926"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:59Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2926"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wfqc-j2nq-x7bw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56975?format=api",
            "vulnerability_id": "VCID-wt8v-67w9-7ugx",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14633.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14633.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45851",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45899",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45916",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45869",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45925",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45922",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45945",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45915",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45923",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45975",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4597",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45919",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14633"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865966",
                    "reference_id": "1865966",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865966"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:54Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14633"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wt8v-67w9-7ugx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56952?format=api",
            "vulnerability_id": "VCID-wvw3-eeya-auee",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14567.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14567.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61784",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61858",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61942",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61924",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61945",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61934",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61913",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61957",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61961",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61888",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61859",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61908",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14567"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865952",
                    "reference_id": "1865952",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865952"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14567"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wvw3-eeya-auee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57164?format=api",
            "vulnerability_id": "VCID-wvxn-ugew-u7bj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78469",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78545",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78475",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78506",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78489",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78516",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78522",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78547",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78529",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78521",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78549",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78548",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755",
                    "reference_id": "1951755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428",
                    "reference_id": "988428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-14",
                    "reference_id": "ASA-202105-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1882",
                    "reference_id": "AVG-1882",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1882"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/",
                    "reference_id": "DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/",
                    "reference_id": "GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-28",
                    "reference_id": "GLSA-202105-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-28"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/",
                    "reference_id": "PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2166"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56964?format=api",
            "vulnerability_id": "VCID-wwy8-j3q8-8khu",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61615",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61699",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61616",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61664",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.617",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61645",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14623"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865962",
                    "reference_id": "1865962",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865962"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:05Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14623"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wwy8-j3q8-8khu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56972?format=api",
            "vulnerability_id": "VCID-wxvs-dchq-uudr",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14632.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14632.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61615",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61699",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61616",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61664",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.617",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00415",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61645",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14632"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865965",
                    "reference_id": "1865965",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865965"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:55Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14632"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wxvs-dchq-uudr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56969?format=api",
            "vulnerability_id": "VCID-xhh7-myxk-xkah",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14631.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14631.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58672",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58755",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58798",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58744",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58797",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58803",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58804",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58784",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58816",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58821",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58777",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14631"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865964",
                    "reference_id": "1865964",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865964"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:57Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:57Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14631"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhh7-myxk-xkah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56990?format=api",
            "vulnerability_id": "VCID-xj3s-qduu-2qbh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14697.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14697.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73818",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73827",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73915",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73851",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73857",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73869",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73891",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73873",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73865",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00789",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73907",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865975",
                    "reference_id": "1865975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865975"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:28Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14697"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xj3s-qduu-2qbh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57079?format=api",
            "vulnerability_id": "VCID-xtxe-6myn-ske5",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2765.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2765.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58931",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59074",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59007",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59029",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59046",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59053",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59035",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59069",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2765"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830052",
                    "reference_id": "1830052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830052"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2765",
                    "reference_id": "CVE-2020-2765",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2765"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:52Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2765"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xtxe-6myn-ske5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57130?format=api",
            "vulnerability_id": "VCID-xzx5-52qt-ffcj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2019.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2019.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51354",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51404",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51478",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51431",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51443",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51441",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51483",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51462",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5145",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51492",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.515",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2019"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922386",
                    "reference_id": "1922386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922386"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2019"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xzx5-52qt-ffcj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57080?format=api",
            "vulnerability_id": "VCID-y2wt-18ad-uyas",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2768",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6121",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61287",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61335",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6135",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6137",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61356",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61337",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61376",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6138",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6136",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6129",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61319",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2768"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:49Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:49Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2768",
                    "reference_id": "CVE-2020-2768",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:P"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2768"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2768"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2wt-18ad-uyas"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57077?format=api",
            "vulnerability_id": "VCID-yavu-9dss-j7hk",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2763.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2763.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6202",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62169",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62079",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62111",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6213",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62148",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62167",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62156",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62179",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62184",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2763"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830051",
                    "reference_id": "1830051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830051"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2763",
                    "reference_id": "CVE-2020-2763",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2763"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4350-1/",
                    "reference_id": "USN-4350-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T14:59:55Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4350-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2763"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yavu-9dss-j7hk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57049?format=api",
            "vulnerability_id": "VCID-yf77-atgx-dyh3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14888"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890781",
                    "reference_id": "1890781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890781"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:56Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14888"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yf77-atgx-dyh3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57055?format=api",
            "vulnerability_id": "VCID-yt4u-3atp-vfb1",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2574.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2574.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2574",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37051",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36881",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37084",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36912",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36962",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36975",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36984",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36948",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36922",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36967",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36951",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36892",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2574"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2020/09/29/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2020/09/29/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798587",
                    "reference_id": "1798587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798587"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html",
                    "reference_id": "msg00007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4026",
                    "reference_id": "RHSA-2020:4026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4026"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4174",
                    "reference_id": "RHSA-2020:4174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4174"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5503",
                    "reference_id": "RHSA-2020:5503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5503"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5655",
                    "reference_id": "RHSA-2020:5655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5660",
                    "reference_id": "RHSA-2020:5660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5660"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5662",
                    "reference_id": "RHSA-2020:5662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-1/",
                    "reference_id": "USN-4250-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4250-2/",
                    "reference_id": "USN-4250-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:05:04Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4250-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-2574"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yt4u-3atp-vfb1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57121?format=api",
            "vulnerability_id": "VCID-z56k-yk6c-hudp",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2006.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2006.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78127",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78136",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7821",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78166",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78148",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78174",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7818",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78206",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78189",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78185",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78217",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78215",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2006"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922381",
                    "reference_id": "1922381",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922381"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/",
                    "reference_id": "ntap-20210622-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210622-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2006"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z56k-yk6c-hudp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57150?format=api",
            "vulnerability_id": "VCID-z7zv-zgw7-n3fj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2058"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922401",
                    "reference_id": "1922401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922401"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2058"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7zv-zgw7-n3fj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56953?format=api",
            "vulnerability_id": "VCID-za2p-vsg7-dudh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14568.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14568.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6291",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62968",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63032",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62997",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62961",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63012",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63028",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63046",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63031",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63053",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14568"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865953",
                    "reference_id": "1865953",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865953"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
                    "reference_id": "CAI7GRYZ5265JVKHC6VXI57MNJDDB63C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
                    "reference_id": "HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
                    "reference_id": "SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4441-1/",
                    "reference_id": "USN-4441-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:08Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14568"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-za2p-vsg7-dudh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57123?format=api",
            "vulnerability_id": "VCID-zjes-mkae-que3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2009.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2009.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41974",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42035",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41978",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42063",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42064",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42086",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42049",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42024",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42074",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42048",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2009"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922424",
                    "reference_id": "1922424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922424"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2021-2009"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zjes-mkae-que3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56967?format=api",
            "vulnerability_id": "VCID-zjsy-ax8b-ckd9",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84519",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84425",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84506",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.845",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84496",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84517",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84459",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84461",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84482",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84488",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14626"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:58Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14626"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zjsy-ax8b-ckd9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57047?format=api",
            "vulnerability_id": "VCID-zn55-b12v-5fax",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14873"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890779",
                    "reference_id": "1890779",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890779"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:06Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83250?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@5.7.34",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83251?format=api",
                    "purl": "pkg:ebuild/dev-db/mysql@8.0.24",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@8.0.24"
                }
            ],
            "aliases": [
                "CVE-2020-14873"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zn55-b12v-5fax"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.7.34"
}