Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/930441?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/930441?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.2-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "mariadb", "version": "1:11.8.2-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1:11.8.5-1", "latest_non_vulnerable_version": "1:11.8.6-6", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70816?format=api", "vulnerability_id": "VCID-3tgc-def7-zufy", "summary": "mariadb: MariaDB Server Crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52971", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15739", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19477", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19326", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21263", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24571", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2482", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24773", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30031", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52971" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437", "reference_id": "1100437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350917", "reference_id": "2350917", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350917" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32084", "reference_id": "MDEV-32084", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:07Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32084" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930440?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.13-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.13-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930433?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.14-0%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-sawk-emag-1ygs" }, { "vulnerability": "VCID-ttzx-uwaj-8uek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.14-0%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930441?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930436?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930435?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066833?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-52971" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3tgc-def7-zufy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70815?format=api", "vulnerability_id": "VCID-45ah-27q3-tbbh", "summary": "mariadb: MariaDB Server Crash Due to Empty Backtrace Log", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52969", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43348", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47684", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56504", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56598", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60574", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64037", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64035", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437", "reference_id": "1100437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350916", "reference_id": "2350916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350916" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32083", "reference_id": "MDEV-32083", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T15:57:59Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930440?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.13-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.13-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930433?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.14-0%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-sawk-emag-1ygs" }, { "vulnerability": "VCID-ttzx-uwaj-8uek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.14-0%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930441?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930436?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930435?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066833?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-52969" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45ah-27q3-tbbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70817?format=api", "vulnerability_id": "VCID-7awt-vh1g-3fdj", "summary": "mariadb: MariaDB Server Crash via Item_direct_view_ref", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52970", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43348", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47684", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48738", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56504", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56598", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64037", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64035", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437", "reference_id": "1100437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350918", "reference_id": "2350918", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350918" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32086", "reference_id": "MDEV-32086", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:41Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930440?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.13-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.13-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930433?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.14-0%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-sawk-emag-1ygs" }, { "vulnerability": "VCID-ttzx-uwaj-8uek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.14-0%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930441?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930436?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930435?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066833?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-52970" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7awt-vh1g-3fdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70374?format=api", "vulnerability_id": "VCID-9c35-pmbb-efe9", "summary": "mysql: mariadb: InnoDB unspecified vulnerability (CPU Apr 2025)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30693", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51469", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51415", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51467", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58571", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58573", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58586", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58609", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58622", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58627", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385", "reference_id": "1103385", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976", "reference_id": "1105976", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359963", "reference_id": "2359963", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359963" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2025.html", "reference_id": "cpuapr2025.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:23:08Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15699", "reference_id": "RHSA-2025:15699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16046", "reference_id": "RHSA-2025:16046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16086", "reference_id": "RHSA-2025:16086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16861", "reference_id": "RHSA-2025:16861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7479-1/", "reference_id": "USN-7479-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7479-1/" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930440?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.13-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.13-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930433?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.14-0%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-sawk-emag-1ygs" }, { "vulnerability": "VCID-ttzx-uwaj-8uek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.14-0%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930441?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930436?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930435?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066833?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-30693" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9c35-pmbb-efe9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70364?format=api", "vulnerability_id": "VCID-a732-u6ue-57h5", "summary": "mysql: mariadb: mysqldump unspecified vulnerability (CPU Apr 2025)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56587", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56649", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56586", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56604", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.5665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56693", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57084", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57136", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385", "reference_id": "1103385", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976", "reference_id": "1105976", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359885", "reference_id": "2359885", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359885" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2025.html", "reference_id": "cpuapr2025.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-17T13:37:19Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15699", "reference_id": "RHSA-2025:15699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16046", "reference_id": "RHSA-2025:16046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16086", "reference_id": "RHSA-2025:16086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16861", "reference_id": "RHSA-2025:16861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7479-1/", "reference_id": "USN-7479-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7479-1/" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930440?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.13-0%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.13-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930433?format=api", "purl": "pkg:deb/debian/mariadb@1:10.11.14-0%2Bdeb12u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-sawk-emag-1ygs" }, { "vulnerability": "VCID-ttzx-uwaj-8uek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:10.11.14-0%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930441?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930436?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/930435?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066833?format=api", "purl": "pkg:deb/debian/mariadb@1:11.8.6-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.6-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-30722" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a732-u6ue-57h5" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb@1:11.8.2-1%3Fdistro=trixie" }