Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
Typedeb
Namespacedebian
Namemariadb-10.5
Version1:10.5.23-0+deb11u1
Qualifiers
distro bullseye
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:10.5.26-0+deb11u1
Latest_non_vulnerable_version1:10.5.29-0+deb11u1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-27zh-jckv-xkgy
vulnerability_id VCID-27zh-jckv-xkgy
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31622.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31622
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10076
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10136
published_at 2026-04-04T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10034
published_at 2026-04-07T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.1011
published_at 2026-04-08T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10171
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.1021
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10151
published_at 2026-04-13T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10024
published_at 2026-04-16T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.10001
published_at 2026-04-18T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.10131
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31622
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092354
reference_id 2092354
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092354
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-31622
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-27zh-jckv-xkgy
1
url VCID-2n1a-mq7k-r3fj
vulnerability_id VCID-2n1a-mq7k-r3fj
summary mariadb: assertion failures in decimal_bin_size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27387.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27387
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47844
published_at 2026-04-02T12:55:00Z
1
value 0.00246
scoring_system epss
scoring_elements 0.47865
published_at 2026-04-04T12:55:00Z
2
value 0.00246
scoring_system epss
scoring_elements 0.47814
published_at 2026-04-07T12:55:00Z
3
value 0.00246
scoring_system epss
scoring_elements 0.47866
published_at 2026-04-08T12:55:00Z
4
value 0.00246
scoring_system epss
scoring_elements 0.47862
published_at 2026-04-09T12:55:00Z
5
value 0.00246
scoring_system epss
scoring_elements 0.47886
published_at 2026-04-11T12:55:00Z
6
value 0.00246
scoring_system epss
scoring_elements 0.47863
published_at 2026-04-12T12:55:00Z
7
value 0.00246
scoring_system epss
scoring_elements 0.47873
published_at 2026-04-13T12:55:00Z
8
value 0.00246
scoring_system epss
scoring_elements 0.47927
published_at 2026-04-16T12:55:00Z
9
value 0.00246
scoring_system epss
scoring_elements 0.47921
published_at 2026-04-18T12:55:00Z
10
value 0.00246
scoring_system epss
scoring_elements 0.47874
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27387
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075006
reference_id 2075006
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075006
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27387
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2n1a-mq7k-r3fj
2
url VCID-33z5-5vrs-7ud3
vulnerability_id VCID-33z5-5vrs-7ud3
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24050.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24050
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21541
published_at 2026-04-21T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21564
published_at 2026-04-16T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21571
published_at 2026-04-18T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21514
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21591
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.2165
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21662
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21624
published_at 2026-04-12T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21566
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24235
published_at 2026-04-04T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24199
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2069833
reference_id 2069833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2069833
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-24050
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-33z5-5vrs-7ud3
3
url VCID-36fa-z98h-3yfk
vulnerability_id VCID-36fa-z98h-3yfk
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35604
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.42962
published_at 2026-04-01T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43022
published_at 2026-04-13T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43004
published_at 2026-04-21T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43049
published_at 2026-04-09T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.42986
published_at 2026-04-07T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43036
published_at 2026-04-08T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43071
published_at 2026-04-11T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43037
published_at 2026-04-12T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.4308
published_at 2026-04-16T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43068
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016101
reference_id 2016101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016101
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
7
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
9
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
10
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
11
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
12
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
13
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
14
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
15
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
17
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
18
reference_url https://usn.ubuntu.com/5123-2/
reference_id USN-5123-2
reference_type
scores
url https://usn.ubuntu.com/5123-2/
19
reference_url https://usn.ubuntu.com/5170-1/
reference_id USN-5170-1
reference_type
scores
url https://usn.ubuntu.com/5170-1/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-35604
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk
4
url VCID-3tgc-def7-zufy
vulnerability_id VCID-3tgc-def7-zufy
summary mariadb: MariaDB Server Crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52971
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.1568
published_at 2026-04-08T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15595
published_at 2026-04-07T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15739
published_at 2026-04-09T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19326
published_at 2026-04-12T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19524
published_at 2026-04-04T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19477
published_at 2026-04-02T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19269
published_at 2026-04-13T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19375
published_at 2026-04-11T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21263
published_at 2026-04-18T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22777
published_at 2026-04-16T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24571
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52971
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437
reference_id 1100437
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2350917
reference_id 2350917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2350917
5
reference_url https://jira.mariadb.org/browse/MDEV-32084
reference_id MDEV-32084
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:07Z/
url https://jira.mariadb.org/browse/MDEV-32084
6
reference_url https://access.redhat.com/errata/RHSA-2026:0136
reference_id RHSA-2026:0136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0136
7
reference_url https://access.redhat.com/errata/RHSA-2026:0247
reference_id RHSA-2026:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0247
8
reference_url https://access.redhat.com/errata/RHSA-2026:0334
reference_id RHSA-2026:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0334
9
reference_url https://access.redhat.com/errata/RHSA-2026:0335
reference_id RHSA-2026:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0335
10
reference_url https://access.redhat.com/errata/RHSA-2026:0376
reference_id RHSA-2026:0376
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0376
11
reference_url https://access.redhat.com/errata/RHSA-2026:6435
reference_id RHSA-2026:6435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6435
12
reference_url https://usn.ubuntu.com/7548-1/
reference_id USN-7548-1
reference_type
scores
url https://usn.ubuntu.com/7548-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@0?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@0%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2023-52971
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tgc-def7-zufy
5
url VCID-43t8-end1-9fb5
vulnerability_id VCID-43t8-end1-9fb5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27455.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27455.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27455
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33075
published_at 2026-04-02T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33107
published_at 2026-04-04T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.32937
published_at 2026-04-07T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.32982
published_at 2026-04-08T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33012
published_at 2026-04-09T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33015
published_at 2026-04-11T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.32976
published_at 2026-04-12T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.32952
published_at 2026-04-13T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.32994
published_at 2026-04-16T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.32973
published_at 2026-04-18T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.32936
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27455
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075701
reference_id 2075701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075701
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27455
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-43t8-end1-9fb5
6
url VCID-45ah-27q3-tbbh
vulnerability_id VCID-45ah-27q3-tbbh
summary mariadb: MariaDB Server Crash Due to Empty Backtrace Log
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52969
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40568
published_at 2026-04-08T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40517
published_at 2026-04-07T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40578
published_at 2026-04-09T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43376
published_at 2026-04-04T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43348
published_at 2026-04-02T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.47707
published_at 2026-04-11T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47684
published_at 2026-04-12T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47693
published_at 2026-04-13T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-21T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56598
published_at 2026-04-18T12:55:00Z
10
value 0.00397
scoring_system epss
scoring_elements 0.60574
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52969
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437
reference_id 1100437
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2350916
reference_id 2350916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2350916
6
reference_url https://jira.mariadb.org/browse/MDEV-32083
reference_id MDEV-32083
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T15:57:59Z/
url https://jira.mariadb.org/browse/MDEV-32083
7
reference_url https://access.redhat.com/errata/RHSA-2025:19572
reference_id RHSA-2025:19572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19572
8
reference_url https://access.redhat.com/errata/RHSA-2025:19584
reference_id RHSA-2025:19584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19584
9
reference_url https://access.redhat.com/errata/RHSA-2026:0136
reference_id RHSA-2026:0136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0136
10
reference_url https://access.redhat.com/errata/RHSA-2026:0247
reference_id RHSA-2026:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0247
11
reference_url https://access.redhat.com/errata/RHSA-2026:0334
reference_id RHSA-2026:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0334
12
reference_url https://access.redhat.com/errata/RHSA-2026:0335
reference_id RHSA-2026:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0335
13
reference_url https://access.redhat.com/errata/RHSA-2026:0376
reference_id RHSA-2026:0376
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0376
14
reference_url https://access.redhat.com/errata/RHSA-2026:6435
reference_id RHSA-2026:6435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6435
15
reference_url https://usn.ubuntu.com/7519-1/
reference_id USN-7519-1
reference_type
scores
url https://usn.ubuntu.com/7519-1/
16
reference_url https://usn.ubuntu.com/7548-1/
reference_id USN-7548-1
reference_type
scores
url https://usn.ubuntu.com/7548-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u2?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.28-0%252Bdeb11u2%3Fdistro=bullseye
aliases CVE-2023-52969
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45ah-27q3-tbbh
7
url VCID-4buk-e1hz-67gv
vulnerability_id VCID-4buk-e1hz-67gv
summary mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46657.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46657
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20903
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21053
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21107
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20823
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20902
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20963
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.2098
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20936
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20882
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20873
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20874
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20854
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46657
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2049305
reference_id 2049305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2049305
5
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
6
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
7
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
8
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
9
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.11-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46657
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4buk-e1hz-67gv
8
url VCID-4msq-13an-d7cb
vulnerability_id VCID-4msq-13an-d7cb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14789
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76541
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76546
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-21T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76574
published_at 2026-04-04T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.76555
published_at 2026-04-07T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76587
published_at 2026-04-08T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-09T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-11T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76604
published_at 2026-04-12T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-13T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-16T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.7664
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890747
reference_id 1890747
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890747
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
11
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
12
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
13
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2020-14789
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb
9
url VCID-5142-jmqx-zffm
vulnerability_id VCID-5142-jmqx-zffm
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32081.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32081
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33209
published_at 2026-04-02T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33241
published_at 2026-04-04T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.33073
published_at 2026-04-07T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.33116
published_at 2026-04-08T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.3315
published_at 2026-04-09T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33152
published_at 2026-04-11T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.33113
published_at 2026-04-12T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.3309
published_at 2026-04-13T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.33131
published_at 2026-04-16T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.33108
published_at 2026-04-18T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.33069
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106028
reference_id 2106028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106028
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2023:5683
reference_id RHSA-2023:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5683
7
reference_url https://access.redhat.com/errata/RHSA-2023:5684
reference_id RHSA-2023:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5684
8
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
9
reference_url https://access.redhat.com/errata/RHSA-2023:6822
reference_id RHSA-2023:6822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6822
10
reference_url https://access.redhat.com/errata/RHSA-2023:6883
reference_id RHSA-2023:6883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6883
11
reference_url https://access.redhat.com/errata/RHSA-2023:7633
reference_id RHSA-2023:7633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7633
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32081
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5142-jmqx-zffm
10
url VCID-525u-kpee-auhh
vulnerability_id VCID-525u-kpee-auhh
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46668.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46668
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10528
published_at 2026-04-01T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10673
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10737
published_at 2026-04-11T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10594
published_at 2026-04-07T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10667
published_at 2026-04-08T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10723
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10706
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10681
published_at 2026-04-13T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10541
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10557
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10686
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050032
reference_id 2050032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050032
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46668
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-525u-kpee-auhh
11
url VCID-5hbe-vqqs-sbav
vulnerability_id VCID-5hbe-vqqs-sbav
summary mariadb: Crash executing query with VIEW, aggregate and subquery
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46659.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46659
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11709
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11831
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11873
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11659
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11744
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11797
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11808
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.1177
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11745
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11608
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11607
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.1173
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2049302
reference_id 2049302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2049302
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46659
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hbe-vqqs-sbav
12
url VCID-5sgr-q6mn-u7gq
vulnerability_id VCID-5sgr-q6mn-u7gq
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14776
reference_id
reference_type
scores
0
value 0.00968
scoring_system epss
scoring_elements 0.76541
published_at 2026-04-01T12:55:00Z
1
value 0.00968
scoring_system epss
scoring_elements 0.76546
published_at 2026-04-02T12:55:00Z
2
value 0.00968
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-21T12:55:00Z
3
value 0.00968
scoring_system epss
scoring_elements 0.76574
published_at 2026-04-04T12:55:00Z
4
value 0.00968
scoring_system epss
scoring_elements 0.76555
published_at 2026-04-07T12:55:00Z
5
value 0.00968
scoring_system epss
scoring_elements 0.76587
published_at 2026-04-08T12:55:00Z
6
value 0.00968
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-09T12:55:00Z
7
value 0.00968
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-11T12:55:00Z
8
value 0.00968
scoring_system epss
scoring_elements 0.76604
published_at 2026-04-12T12:55:00Z
9
value 0.00968
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-13T12:55:00Z
10
value 0.00968
scoring_system epss
scoring_elements 0.76636
published_at 2026-04-16T12:55:00Z
11
value 0.00968
scoring_system epss
scoring_elements 0.7664
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890743
reference_id 1890743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890743
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
11
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
12
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
13
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
14
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
15
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2020-14776
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq
13
url VCID-6atg-7j6k-dkhp
vulnerability_id VCID-6atg-7j6k-dkhp
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22084
reference_id
reference_type
scores
0
value 0.01362
scoring_system epss
scoring_elements 0.8013
published_at 2026-04-02T12:55:00Z
1
value 0.01362
scoring_system epss
scoring_elements 0.8015
published_at 2026-04-04T12:55:00Z
2
value 0.01362
scoring_system epss
scoring_elements 0.80138
published_at 2026-04-07T12:55:00Z
3
value 0.01362
scoring_system epss
scoring_elements 0.80167
published_at 2026-04-08T12:55:00Z
4
value 0.01362
scoring_system epss
scoring_elements 0.80174
published_at 2026-04-09T12:55:00Z
5
value 0.01362
scoring_system epss
scoring_elements 0.80193
published_at 2026-04-11T12:55:00Z
6
value 0.01362
scoring_system epss
scoring_elements 0.80178
published_at 2026-04-12T12:55:00Z
7
value 0.01362
scoring_system epss
scoring_elements 0.80169
published_at 2026-04-13T12:55:00Z
8
value 0.01362
scoring_system epss
scoring_elements 0.80198
published_at 2026-04-18T12:55:00Z
9
value 0.01362
scoring_system epss
scoring_elements 0.802
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245023
reference_id 2245023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245023
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
9
reference_url https://access.redhat.com/errata/RHSA-2025:0739
reference_id RHSA-2025:0739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0739
10
reference_url https://access.redhat.com/errata/RHSA-2025:0914
reference_id RHSA-2025:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0914
11
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
12
reference_url https://usn.ubuntu.com/6583-1/
reference_id USN-6583-1
reference_type
scores
url https://usn.ubuntu.com/6583-1/
13
reference_url https://usn.ubuntu.com/6600-1/
reference_id USN-6600-1
reference_type
scores
url https://usn.ubuntu.com/6600-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2023-22084
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6atg-7j6k-dkhp
14
url VCID-6uu4-2sn3-1fex
vulnerability_id VCID-6uu4-2sn3-1fex
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27452.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27452.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27452
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33877
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33909
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33763
published_at 2026-04-07T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33806
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.3384
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33837
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33795
published_at 2026-04-12T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33771
published_at 2026-04-13T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33808
published_at 2026-04-16T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33794
published_at 2026-04-18T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33761
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27452
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2076145
reference_id 2076145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2076145
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27452
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uu4-2sn3-1fex
15
url VCID-71sp-67qb-g7c1
vulnerability_id VCID-71sp-67qb-g7c1
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27379.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27379
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.58289
published_at 2026-04-02T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58309
published_at 2026-04-04T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-07T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58337
published_at 2026-04-08T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58343
published_at 2026-04-09T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58361
published_at 2026-04-11T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58338
published_at 2026-04-12T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58318
published_at 2026-04-13T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58351
published_at 2026-04-16T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58354
published_at 2026-04-18T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58331
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27379
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074951
reference_id 2074951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074951
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27379
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71sp-67qb-g7c1
16
url VCID-75zq-85c3-jfc5
vulnerability_id VCID-75zq-85c3-jfc5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27380.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27380
reference_id
reference_type
scores
0
value 0.00492
scoring_system epss
scoring_elements 0.65588
published_at 2026-04-02T12:55:00Z
1
value 0.00492
scoring_system epss
scoring_elements 0.65617
published_at 2026-04-04T12:55:00Z
2
value 0.00492
scoring_system epss
scoring_elements 0.65584
published_at 2026-04-07T12:55:00Z
3
value 0.00492
scoring_system epss
scoring_elements 0.65636
published_at 2026-04-08T12:55:00Z
4
value 0.00492
scoring_system epss
scoring_elements 0.65648
published_at 2026-04-09T12:55:00Z
5
value 0.00492
scoring_system epss
scoring_elements 0.65669
published_at 2026-04-11T12:55:00Z
6
value 0.00492
scoring_system epss
scoring_elements 0.65654
published_at 2026-04-12T12:55:00Z
7
value 0.00492
scoring_system epss
scoring_elements 0.65626
published_at 2026-04-13T12:55:00Z
8
value 0.00492
scoring_system epss
scoring_elements 0.65661
published_at 2026-04-16T12:55:00Z
9
value 0.00492
scoring_system epss
scoring_elements 0.65674
published_at 2026-04-18T12:55:00Z
10
value 0.00492
scoring_system epss
scoring_elements 0.65656
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27380
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074966
reference_id 2074966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074966
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27380
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75zq-85c3-jfc5
17
url VCID-7awt-vh1g-3fdj
vulnerability_id VCID-7awt-vh1g-3fdj
summary mariadb: MariaDB Server Crash via Item_direct_view_ref
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52970
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40568
published_at 2026-04-08T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40517
published_at 2026-04-07T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40578
published_at 2026-04-09T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43376
published_at 2026-04-04T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43348
published_at 2026-04-02T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.47707
published_at 2026-04-11T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47693
published_at 2026-04-13T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.47684
published_at 2026-04-12T12:55:00Z
8
value 0.00254
scoring_system epss
scoring_elements 0.48738
published_at 2026-04-16T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-21T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56598
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52970
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437
reference_id 1100437
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2350918
reference_id 2350918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2350918
6
reference_url https://jira.mariadb.org/browse/MDEV-32086
reference_id MDEV-32086
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:41Z/
url https://jira.mariadb.org/browse/MDEV-32086
7
reference_url https://access.redhat.com/errata/RHSA-2025:19572
reference_id RHSA-2025:19572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19572
8
reference_url https://access.redhat.com/errata/RHSA-2025:19584
reference_id RHSA-2025:19584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19584
9
reference_url https://access.redhat.com/errata/RHSA-2026:0136
reference_id RHSA-2026:0136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0136
10
reference_url https://access.redhat.com/errata/RHSA-2026:0247
reference_id RHSA-2026:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0247
11
reference_url https://access.redhat.com/errata/RHSA-2026:0334
reference_id RHSA-2026:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0334
12
reference_url https://access.redhat.com/errata/RHSA-2026:0335
reference_id RHSA-2026:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0335
13
reference_url https://access.redhat.com/errata/RHSA-2026:0376
reference_id RHSA-2026:0376
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0376
14
reference_url https://access.redhat.com/errata/RHSA-2026:6435
reference_id RHSA-2026:6435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6435
15
reference_url https://usn.ubuntu.com/7519-1/
reference_id USN-7519-1
reference_type
scores
url https://usn.ubuntu.com/7519-1/
16
reference_url https://usn.ubuntu.com/7548-1/
reference_id USN-7548-1
reference_type
scores
url https://usn.ubuntu.com/7548-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u2?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.28-0%252Bdeb11u2%3Fdistro=bullseye
aliases CVE-2023-52970
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7awt-vh1g-3fdj
18
url VCID-844r-9np7-k7c8
vulnerability_id VCID-844r-9np7-k7c8
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46666.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46666
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19564
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19705
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19754
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19479
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19558
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.1961
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19614
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19566
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19508
published_at 2026-04-13T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19474
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19482
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19494
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46666
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050028
reference_id 2050028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050028
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.11-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46666
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-844r-9np7-k7c8
19
url VCID-9c35-pmbb-efe9
vulnerability_id VCID-9c35-pmbb-efe9
summary mysql: mariadb: InnoDB unspecified vulnerability (CPU Apr 2025)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30693
reference_id
reference_type
scores
0
value 0.00281
scoring_system epss
scoring_elements 0.51469
published_at 2026-04-08T12:55:00Z
1
value 0.00281
scoring_system epss
scoring_elements 0.51415
published_at 2026-04-07T12:55:00Z
2
value 0.00281
scoring_system epss
scoring_elements 0.51467
published_at 2026-04-09T12:55:00Z
3
value 0.00366
scoring_system epss
scoring_elements 0.58622
published_at 2026-04-16T12:55:00Z
4
value 0.00366
scoring_system epss
scoring_elements 0.58584
published_at 2026-04-04T12:55:00Z
5
value 0.00366
scoring_system epss
scoring_elements 0.58627
published_at 2026-04-18T12:55:00Z
6
value 0.00366
scoring_system epss
scoring_elements 0.58563
published_at 2026-04-02T12:55:00Z
7
value 0.00366
scoring_system epss
scoring_elements 0.58605
published_at 2026-04-21T12:55:00Z
8
value 0.00366
scoring_system epss
scoring_elements 0.58628
published_at 2026-04-11T12:55:00Z
9
value 0.00366
scoring_system epss
scoring_elements 0.58609
published_at 2026-04-12T12:55:00Z
10
value 0.00366
scoring_system epss
scoring_elements 0.58589
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30693
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385
reference_id 1103385
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976
reference_id 1105976
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359963
reference_id 2359963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359963
7
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:23:08Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:15699
reference_id RHSA-2025:15699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15699
9
reference_url https://access.redhat.com/errata/RHSA-2025:16046
reference_id RHSA-2025:16046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16046
10
reference_url https://access.redhat.com/errata/RHSA-2025:16086
reference_id RHSA-2025:16086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16086
11
reference_url https://access.redhat.com/errata/RHSA-2025:16861
reference_id RHSA-2025:16861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16861
12
reference_url https://access.redhat.com/errata/RHSA-2025:19572
reference_id RHSA-2025:19572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19572
13
reference_url https://access.redhat.com/errata/RHSA-2025:19584
reference_id RHSA-2025:19584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19584
14
reference_url https://access.redhat.com/errata/RHSA-2026:0136
reference_id RHSA-2026:0136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0136
15
reference_url https://access.redhat.com/errata/RHSA-2026:0247
reference_id RHSA-2026:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0247
16
reference_url https://access.redhat.com/errata/RHSA-2026:0334
reference_id RHSA-2026:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0334
17
reference_url https://access.redhat.com/errata/RHSA-2026:0335
reference_id RHSA-2026:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0335
18
reference_url https://access.redhat.com/errata/RHSA-2026:0376
reference_id RHSA-2026:0376
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0376
19
reference_url https://access.redhat.com/errata/RHSA-2026:6435
reference_id RHSA-2026:6435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6435
20
reference_url https://usn.ubuntu.com/7479-1/
reference_id USN-7479-1
reference_type
scores
url https://usn.ubuntu.com/7479-1/
21
reference_url https://usn.ubuntu.com/7519-1/
reference_id USN-7519-1
reference_type
scores
url https://usn.ubuntu.com/7519-1/
22
reference_url https://usn.ubuntu.com/7548-1/
reference_id USN-7548-1
reference_type
scores
url https://usn.ubuntu.com/7548-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.29-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.29-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.29-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2025-30693
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9c35-pmbb-efe9
20
url VCID-9cj5-1s7j-2bhz
vulnerability_id VCID-9cj5-1s7j-2bhz
summary mariadb: Named pipe permission issue on Windows
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28912.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28912
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.30102
published_at 2026-04-01T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.3014
published_at 2026-04-02T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.30187
published_at 2026-04-04T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.3
published_at 2026-04-07T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.3006
published_at 2026-04-08T12:55:00Z
5
value 0.00114
scoring_system epss
scoring_elements 0.30096
published_at 2026-04-09T12:55:00Z
6
value 0.00114
scoring_system epss
scoring_elements 0.30101
published_at 2026-04-11T12:55:00Z
7
value 0.00114
scoring_system epss
scoring_elements 0.30057
published_at 2026-04-12T12:55:00Z
8
value 0.00114
scoring_system epss
scoring_elements 0.30008
published_at 2026-04-13T12:55:00Z
9
value 0.00114
scoring_system epss
scoring_elements 0.30023
published_at 2026-04-16T12:55:00Z
10
value 0.00114
scoring_system epss
scoring_elements 0.30003
published_at 2026-04-18T12:55:00Z
11
value 0.00114
scoring_system epss
scoring_elements 0.29959
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28912
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1899332
reference_id 1899332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1899332
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@0?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@0%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2020-28912
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cj5-1s7j-2bhz
21
url VCID-9dt5-yek1-wfg9
vulnerability_id VCID-9dt5-yek1-wfg9
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2194
reference_id
reference_type
scores
0
value 0.0117
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-01T12:55:00Z
1
value 0.0117
scoring_system epss
scoring_elements 0.78619
published_at 2026-04-02T12:55:00Z
2
value 0.0117
scoring_system epss
scoring_elements 0.78684
published_at 2026-04-21T12:55:00Z
3
value 0.0117
scoring_system epss
scoring_elements 0.78649
published_at 2026-04-04T12:55:00Z
4
value 0.0117
scoring_system epss
scoring_elements 0.7863
published_at 2026-04-07T12:55:00Z
5
value 0.0117
scoring_system epss
scoring_elements 0.78656
published_at 2026-04-08T12:55:00Z
6
value 0.0117
scoring_system epss
scoring_elements 0.78663
published_at 2026-04-09T12:55:00Z
7
value 0.0117
scoring_system epss
scoring_elements 0.78688
published_at 2026-04-11T12:55:00Z
8
value 0.0117
scoring_system epss
scoring_elements 0.78669
published_at 2026-04-12T12:55:00Z
9
value 0.0117
scoring_system epss
scoring_elements 0.78661
published_at 2026-04-13T12:55:00Z
10
value 0.0117
scoring_system epss
scoring_elements 0.7869
published_at 2026-04-16T12:55:00Z
11
value 0.0117
scoring_system epss
scoring_elements 0.78687
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2194
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951764
reference_id 1951764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951764
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
7
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
8
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
9
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
10
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
11
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
12
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
13
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
15
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
16
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-2194
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dt5-yek1-wfg9
22
url VCID-9ef6-tbwp-pbct
vulnerability_id VCID-9ef6-tbwp-pbct
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24052.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24052
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.1999
published_at 2026-04-21T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19991
published_at 2026-04-16T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19995
published_at 2026-04-18T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20035
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20094
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20112
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20067
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20009
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.2275
published_at 2026-04-04T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22706
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24052
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2068211
reference_id 2068211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2068211
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-24052
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ef6-tbwp-pbct
23
url VCID-a732-u6ue-57h5
vulnerability_id VCID-a732-u6ue-57h5
summary mysql: mariadb: mysqldump unspecified vulnerability (CPU Apr 2025)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30722
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.56629
published_at 2026-04-02T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56649
published_at 2026-04-21T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.5665
published_at 2026-04-04T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56693
published_at 2026-04-11T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56668
published_at 2026-04-12T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56647
published_at 2026-04-13T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56678
published_at 2026-04-16T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56677
published_at 2026-04-18T12:55:00Z
8
value 0.00345
scoring_system epss
scoring_elements 0.57084
published_at 2026-04-07T12:55:00Z
9
value 0.00345
scoring_system epss
scoring_elements 0.57134
published_at 2026-04-08T12:55:00Z
10
value 0.00345
scoring_system epss
scoring_elements 0.57136
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385
reference_id 1103385
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976
reference_id 1105976
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359885
reference_id 2359885
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359885
7
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-17T13:37:19Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:15699
reference_id RHSA-2025:15699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15699
9
reference_url https://access.redhat.com/errata/RHSA-2025:16046
reference_id RHSA-2025:16046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16046
10
reference_url https://access.redhat.com/errata/RHSA-2025:16086
reference_id RHSA-2025:16086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16086
11
reference_url https://access.redhat.com/errata/RHSA-2025:16861
reference_id RHSA-2025:16861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16861
12
reference_url https://access.redhat.com/errata/RHSA-2025:19572
reference_id RHSA-2025:19572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19572
13
reference_url https://access.redhat.com/errata/RHSA-2025:19584
reference_id RHSA-2025:19584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19584
14
reference_url https://access.redhat.com/errata/RHSA-2026:0136
reference_id RHSA-2026:0136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0136
15
reference_url https://access.redhat.com/errata/RHSA-2026:0247
reference_id RHSA-2026:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0247
16
reference_url https://access.redhat.com/errata/RHSA-2026:0334
reference_id RHSA-2026:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0334
17
reference_url https://access.redhat.com/errata/RHSA-2026:0335
reference_id RHSA-2026:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0335
18
reference_url https://access.redhat.com/errata/RHSA-2026:0376
reference_id RHSA-2026:0376
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0376
19
reference_url https://access.redhat.com/errata/RHSA-2026:6435
reference_id RHSA-2026:6435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6435
20
reference_url https://usn.ubuntu.com/7479-1/
reference_id USN-7479-1
reference_type
scores
url https://usn.ubuntu.com/7479-1/
21
reference_url https://usn.ubuntu.com/7519-1/
reference_id USN-7519-1
reference_type
scores
url https://usn.ubuntu.com/7519-1/
22
reference_url https://usn.ubuntu.com/7548-1/
reference_id USN-7548-1
reference_type
scores
url https://usn.ubuntu.com/7548-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.29-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.29-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.29-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2025-30722
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a732-u6ue-57h5
24
url VCID-b3mn-83vb-jbdw
vulnerability_id VCID-b3mn-83vb-jbdw
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24048.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24048
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.1999
published_at 2026-04-21T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19991
published_at 2026-04-16T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19995
published_at 2026-04-18T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20035
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20094
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20112
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20067
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20009
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.2275
published_at 2026-04-04T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22706
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24048
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2068234
reference_id 2068234
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2068234
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-24048
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3mn-83vb-jbdw
25
url VCID-b95t-t1d4-kfda
vulnerability_id VCID-b95t-t1d4-kfda
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32088.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32088.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32088
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50624
published_at 2026-04-02T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50651
published_at 2026-04-04T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50606
published_at 2026-04-07T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.5066
published_at 2026-04-08T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50656
published_at 2026-04-09T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50699
published_at 2026-04-11T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50676
published_at 2026-04-12T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50661
published_at 2026-04-13T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50702
published_at 2026-04-16T12:55:00Z
9
value 0.00272
scoring_system epss
scoring_elements 0.50708
published_at 2026-04-18T12:55:00Z
10
value 0.00272
scoring_system epss
scoring_elements 0.50687
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32088
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32088
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32088
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106008
reference_id 2106008
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106008
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32088
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b95t-t1d4-kfda
26
url VCID-bufd-a3f4-7ucf
vulnerability_id VCID-bufd-a3f4-7ucf
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32082.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32082
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39104
published_at 2026-04-02T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39126
published_at 2026-04-04T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39046
published_at 2026-04-07T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39101
published_at 2026-04-08T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39117
published_at 2026-04-09T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39129
published_at 2026-04-11T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39092
published_at 2026-04-12T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39072
published_at 2026-04-13T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39128
published_at 2026-04-16T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39097
published_at 2026-04-18T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39009
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106030
reference_id 2106030
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106030
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2023:5683
reference_id RHSA-2023:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5683
7
reference_url https://access.redhat.com/errata/RHSA-2023:5684
reference_id RHSA-2023:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5684
8
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
9
reference_url https://access.redhat.com/errata/RHSA-2023:6822
reference_id RHSA-2023:6822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6822
10
reference_url https://access.redhat.com/errata/RHSA-2023:6883
reference_id RHSA-2023:6883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6883
11
reference_url https://access.redhat.com/errata/RHSA-2023:7633
reference_id RHSA-2023:7633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7633
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32082
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bufd-a3f4-7ucf
27
url VCID-c45y-pbjr-73ez
vulnerability_id VCID-c45y-pbjr-73ez
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47015.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47015
reference_id
reference_type
scores
0
value 0.00221
scoring_system epss
scoring_elements 0.44719
published_at 2026-04-02T12:55:00Z
1
value 0.00221
scoring_system epss
scoring_elements 0.44695
published_at 2026-04-21T12:55:00Z
2
value 0.00221
scoring_system epss
scoring_elements 0.44739
published_at 2026-04-04T12:55:00Z
3
value 0.00221
scoring_system epss
scoring_elements 0.44677
published_at 2026-04-07T12:55:00Z
4
value 0.00221
scoring_system epss
scoring_elements 0.4473
published_at 2026-04-08T12:55:00Z
5
value 0.00221
scoring_system epss
scoring_elements 0.44732
published_at 2026-04-09T12:55:00Z
6
value 0.00221
scoring_system epss
scoring_elements 0.44749
published_at 2026-04-11T12:55:00Z
7
value 0.00221
scoring_system epss
scoring_elements 0.44717
published_at 2026-04-12T12:55:00Z
8
value 0.00221
scoring_system epss
scoring_elements 0.44718
published_at 2026-04-13T12:55:00Z
9
value 0.00221
scoring_system epss
scoring_elements 0.44773
published_at 2026-04-16T12:55:00Z
10
value 0.00221
scoring_system epss
scoring_elements 0.44765
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47015
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034889
reference_id 1034889
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034889
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2163609
reference_id 2163609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2163609
6
reference_url https://github.com/MariaDB/server/commit/be0a46b3d52b58956fd0d47d040b9f4514406954
reference_id be0a46b3d52b58956fd0d47d040b9f4514406954
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/
url https://github.com/MariaDB/server/commit/be0a46b3d52b58956fd0d47d040b9f4514406954
7
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
8
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00005.html
9
reference_url https://security.netapp.com/advisory/ntap-20230309-0009/
reference_id ntap-20230309-0009
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/
url https://security.netapp.com/advisory/ntap-20230309-0009/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/
reference_id O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/
11
reference_url https://access.redhat.com/errata/RHSA-2023:5259
reference_id RHSA-2023:5259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5259
12
reference_url https://access.redhat.com/errata/RHSA-2023:5683
reference_id RHSA-2023:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5683
13
reference_url https://access.redhat.com/errata/RHSA-2023:5684
reference_id RHSA-2023:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5684
14
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
15
reference_url https://access.redhat.com/errata/RHSA-2023:6822
reference_id RHSA-2023:6822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6822
16
reference_url https://access.redhat.com/errata/RHSA-2023:6883
reference_id RHSA-2023:6883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6883
17
reference_url https://access.redhat.com/errata/RHSA-2023:7633
reference_id RHSA-2023:7633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7633
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU/
reference_id SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU/
19
reference_url https://usn.ubuntu.com/6600-1/
reference_id USN-6600-1
reference_type
scores
url https://usn.ubuntu.com/6600-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.20-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.20-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.20-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-47015
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c45y-pbjr-73ez
28
url VCID-c4ag-ndpx-kbcv
vulnerability_id VCID-c4ag-ndpx-kbcv
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27384.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27384
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.58289
published_at 2026-04-02T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58309
published_at 2026-04-04T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-07T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58337
published_at 2026-04-08T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58343
published_at 2026-04-09T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58361
published_at 2026-04-11T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58338
published_at 2026-04-12T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58318
published_at 2026-04-13T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58351
published_at 2026-04-16T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58354
published_at 2026-04-18T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58331
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074999
reference_id 2074999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074999
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27384
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4ag-ndpx-kbcv
29
url VCID-cnw5-r38y-4uc5
vulnerability_id VCID-cnw5-r38y-4uc5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38791.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38791
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10363
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1043
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10314
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10387
published_at 2026-04-21T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.1045
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.1048
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10436
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10414
published_at 2026-04-13T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10284
published_at 2026-04-16T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10255
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38791
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38791
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2130105
reference_id 2130105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2130105
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2023:5259
reference_id RHSA-2023:5259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5259
7
reference_url https://access.redhat.com/errata/RHSA-2023:5683
reference_id RHSA-2023:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5683
8
reference_url https://access.redhat.com/errata/RHSA-2023:5684
reference_id RHSA-2023:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5684
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://access.redhat.com/errata/RHSA-2023:6822
reference_id RHSA-2023:6822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6822
11
reference_url https://access.redhat.com/errata/RHSA-2023:6883
reference_id RHSA-2023:6883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6883
12
reference_url https://access.redhat.com/errata/RHSA-2023:7633
reference_id RHSA-2023:7633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7633
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-38791
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cnw5-r38y-4uc5
30
url VCID-d4g3-12ak-aybw
vulnerability_id VCID-d4g3-12ak-aybw
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32086.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32086
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.30063
published_at 2026-04-02T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.3011
published_at 2026-04-04T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.29923
published_at 2026-04-07T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.29985
published_at 2026-04-08T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.30019
published_at 2026-04-09T12:55:00Z
5
value 0.00114
scoring_system epss
scoring_elements 0.30025
published_at 2026-04-11T12:55:00Z
6
value 0.00114
scoring_system epss
scoring_elements 0.2998
published_at 2026-04-12T12:55:00Z
7
value 0.00114
scoring_system epss
scoring_elements 0.29931
published_at 2026-04-13T12:55:00Z
8
value 0.00114
scoring_system epss
scoring_elements 0.29947
published_at 2026-04-16T12:55:00Z
9
value 0.00114
scoring_system epss
scoring_elements 0.29927
published_at 2026-04-18T12:55:00Z
10
value 0.00114
scoring_system epss
scoring_elements 0.29879
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32086
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2104433
reference_id 2104433
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2104433
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32086
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d4g3-12ak-aybw
31
url VCID-dxbv-e8pq-p7ew
vulnerability_id VCID-dxbv-e8pq-p7ew
summary mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21096.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21096
reference_id
reference_type
scores
0
value 0.00121
scoring_system epss
scoring_elements 0.31104
published_at 2026-04-21T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31301
published_at 2026-04-04T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.31121
published_at 2026-04-07T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.31174
published_at 2026-04-08T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31205
published_at 2026-04-09T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.3121
published_at 2026-04-11T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.31167
published_at 2026-04-12T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31123
published_at 2026-04-13T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31156
published_at 2026-04-16T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31136
published_at 2026-04-18T12:55:00Z
10
value 0.00121
scoring_system epss
scoring_elements 0.31259
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21096
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189
reference_id 1069189
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275452
reference_id 2275452
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275452
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/
reference_id CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*
9
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/
reference_id KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/
11
reference_url https://security.netapp.com/advisory/ntap-20240426-0013/
reference_id ntap-20240426-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/
url https://security.netapp.com/advisory/ntap-20240426-0013/
12
reference_url https://access.redhat.com/errata/RHSA-2025:0737
reference_id RHSA-2025:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0737
13
reference_url https://access.redhat.com/errata/RHSA-2025:0739
reference_id RHSA-2025:0739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0739
14
reference_url https://access.redhat.com/errata/RHSA-2025:0912
reference_id RHSA-2025:0912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0912
15
reference_url https://access.redhat.com/errata/RHSA-2025:0914
reference_id RHSA-2025:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0914
16
reference_url https://access.redhat.com/errata/RHSA-2026:0335
reference_id RHSA-2026:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0335
17
reference_url https://usn.ubuntu.com/6823-1/
reference_id USN-6823-1
reference_type
scores
url https://usn.ubuntu.com/6823-1/
18
reference_url https://usn.ubuntu.com/6839-1/
reference_id USN-6839-1
reference_type
scores
url https://usn.ubuntu.com/6839-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.26-0%2Bdeb11u2?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.26-0%2Bdeb11u2?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.26-0%252Bdeb11u2%3Fdistro=bullseye
aliases CVE-2024-21096
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxbv-e8pq-p7ew
32
url VCID-eakf-rhk4-m3g8
vulnerability_id VCID-eakf-rhk4-m3g8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2154
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-21T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22765
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-04T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-07T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22675
published_at 2026-04-08T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22726
published_at 2026-04-09T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22746
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22707
published_at 2026-04-12T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.2265
published_at 2026-04-13T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22666
published_at 2026-04-16T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22662
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2154
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951752
reference_id 1951752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951752
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
reference_id 988428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
6
reference_url https://security.archlinux.org/ASA-202105-14
reference_id ASA-202105-14
reference_type
scores
url https://security.archlinux.org/ASA-202105-14
7
reference_url https://security.archlinux.org/AVG-1882
reference_id AVG-1882
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1882
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
reference_id DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
reference_id GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
10
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://security.gentoo.org/glsa/202105-27
11
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://security.gentoo.org/glsa/202105-28
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
reference_id PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
13
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
14
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
15
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
16
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
17
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
18
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
19
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
20
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.10-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.10-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.10-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-2154
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eakf-rhk4-m3g8
33
url VCID-edcd-rsx7-ykb4
vulnerability_id VCID-edcd-rsx7-ykb4
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27381.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27381.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27381
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.58289
published_at 2026-04-02T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58309
published_at 2026-04-04T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-07T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58337
published_at 2026-04-08T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58343
published_at 2026-04-09T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58361
published_at 2026-04-11T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58338
published_at 2026-04-12T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58318
published_at 2026-04-13T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58351
published_at 2026-04-16T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58354
published_at 2026-04-18T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58331
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27381
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074981
reference_id 2074981
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074981
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27381
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edcd-rsx7-ykb4
34
url VCID-ezwh-q7de-abey
vulnerability_id VCID-ezwh-q7de-abey
summary mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21427
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22213
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22046
published_at 2026-04-21T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22124
published_at 2026-04-08T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22179
published_at 2026-04-09T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22199
published_at 2026-04-11T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22159
published_at 2026-04-12T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22099
published_at 2026-04-16T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22093
published_at 2026-04-18T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22261
published_at 2026-04-04T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22044
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082644
reference_id 2082644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082644
4
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:32Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
6
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
7
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
8
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
9
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
10
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
11
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-21427
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwh-q7de-abey
35
url VCID-g2x8-3226-jufz
vulnerability_id VCID-g2x8-3226-jufz
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31624
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13585
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13646
published_at 2026-04-04T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13445
published_at 2026-04-21T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13526
published_at 2026-04-08T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13576
published_at 2026-04-09T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13548
published_at 2026-04-11T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.1351
published_at 2026-04-12T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13463
published_at 2026-04-13T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13376
published_at 2026-04-16T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13374
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092362
reference_id 2092362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092362
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-31624
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2x8-3226-jufz
36
url VCID-gqcf-pren-h3cm
vulnerability_id VCID-gqcf-pren-h3cm
summary mariadb: server crash in Item_args::walk_args
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32087.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32087.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32087
reference_id
reference_type
scores
0
value 0.00952
scoring_system epss
scoring_elements 0.76334
published_at 2026-04-02T12:55:00Z
1
value 0.00952
scoring_system epss
scoring_elements 0.76364
published_at 2026-04-04T12:55:00Z
2
value 0.00952
scoring_system epss
scoring_elements 0.76344
published_at 2026-04-07T12:55:00Z
3
value 0.00952
scoring_system epss
scoring_elements 0.76377
published_at 2026-04-08T12:55:00Z
4
value 0.00952
scoring_system epss
scoring_elements 0.7639
published_at 2026-04-09T12:55:00Z
5
value 0.00952
scoring_system epss
scoring_elements 0.76416
published_at 2026-04-11T12:55:00Z
6
value 0.00952
scoring_system epss
scoring_elements 0.76394
published_at 2026-04-12T12:55:00Z
7
value 0.00952
scoring_system epss
scoring_elements 0.76389
published_at 2026-04-13T12:55:00Z
8
value 0.00952
scoring_system epss
scoring_elements 0.76429
published_at 2026-04-16T12:55:00Z
9
value 0.00952
scoring_system epss
scoring_elements 0.76435
published_at 2026-04-18T12:55:00Z
10
value 0.00952
scoring_system epss
scoring_elements 0.76419
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32087
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32087
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2104434
reference_id 2104434
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2104434
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32087
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqcf-pren-h3cm
37
url VCID-gqcv-pefj-43au
vulnerability_id VCID-gqcv-pefj-43au
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32091.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32091.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32091
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.5488
published_at 2026-04-02T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54906
published_at 2026-04-04T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54875
published_at 2026-04-07T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54925
published_at 2026-04-08T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54923
published_at 2026-04-09T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54936
published_at 2026-04-18T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54918
published_at 2026-04-12T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54895
published_at 2026-04-13T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54933
published_at 2026-04-16T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.54916
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32091
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106042
reference_id 2106042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106042
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2023:5259
reference_id RHSA-2023:5259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5259
7
reference_url https://access.redhat.com/errata/RHSA-2023:5683
reference_id RHSA-2023:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5683
8
reference_url https://access.redhat.com/errata/RHSA-2023:5684
reference_id RHSA-2023:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5684
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://access.redhat.com/errata/RHSA-2023:6822
reference_id RHSA-2023:6822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6822
11
reference_url https://access.redhat.com/errata/RHSA-2023:6883
reference_id RHSA-2023:6883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6883
12
reference_url https://access.redhat.com/errata/RHSA-2023:7633
reference_id RHSA-2023:7633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7633
13
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32091
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqcv-pefj-43au
38
url VCID-j734-hefa-1yaa
vulnerability_id VCID-j734-hefa-1yaa
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2372
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49828
published_at 2026-04-01T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.49901
published_at 2026-04-21T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49865
published_at 2026-04-02T12:55:00Z
3
value 0.00264
scoring_system epss
scoring_elements 0.49893
published_at 2026-04-04T12:55:00Z
4
value 0.00264
scoring_system epss
scoring_elements 0.49844
published_at 2026-04-07T12:55:00Z
5
value 0.00264
scoring_system epss
scoring_elements 0.49898
published_at 2026-04-08T12:55:00Z
6
value 0.00264
scoring_system epss
scoring_elements 0.49892
published_at 2026-04-09T12:55:00Z
7
value 0.00264
scoring_system epss
scoring_elements 0.4991
published_at 2026-04-11T12:55:00Z
8
value 0.00264
scoring_system epss
scoring_elements 0.49882
published_at 2026-04-12T12:55:00Z
9
value 0.00264
scoring_system epss
scoring_elements 0.49883
published_at 2026-04-13T12:55:00Z
10
value 0.00264
scoring_system epss
scoring_elements 0.49928
published_at 2026-04-16T12:55:00Z
11
value 0.00264
scoring_system epss
scoring_elements 0.49929
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2372
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992303
reference_id 1992303
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992303
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
7
reference_url https://security.archlinux.org/AVG-2226
reference_id AVG-2226
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2226
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
9
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
10
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
11
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
12
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
13
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
14
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
15
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
17
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
18
reference_url https://usn.ubuntu.com/5022-2/
reference_id USN-5022-2
reference_type
scores
url https://usn.ubuntu.com/5022-2/
19
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.12-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.12-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.12-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-2372
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j734-hefa-1yaa
39
url VCID-jed2-gwqr-zbed
vulnerability_id VCID-jed2-gwqr-zbed
summary mariadb: Crash in MariaDB Due to Improper Handling of Derived Tables
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52968.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52968.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52968
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05305
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05153
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06339
published_at 2026-04-16T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27692
published_at 2026-04-04T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27483
published_at 2026-04-07T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27551
published_at 2026-04-08T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27594
published_at 2026-04-09T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27598
published_at 2026-04-11T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27554
published_at 2026-04-12T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27497
published_at 2026-04-13T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27654
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52968
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52968
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2350915
reference_id 2350915
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2350915
5
reference_url https://jira.mariadb.org/browse/MDEV-32082
reference_id MDEV-32082
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T15:58:35Z/
url https://jira.mariadb.org/browse/MDEV-32082
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.26-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.26-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.26-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2023-52968
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jed2-gwqr-zbed
40
url VCID-jpqr-hknn-6fd9
vulnerability_id VCID-jpqr-hknn-6fd9
summary mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21490.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21490
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.53099
published_at 2026-04-12T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.53082
published_at 2026-04-13T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57453
published_at 2026-04-21T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57478
published_at 2026-04-16T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.57474
published_at 2026-04-18T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.60175
published_at 2026-04-07T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60225
published_at 2026-04-08T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.6024
published_at 2026-04-09T12:55:00Z
8
value 0.00403
scoring_system epss
scoring_elements 0.60941
published_at 2026-04-11T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-04T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63593
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877
reference_id 1093877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2339221
reference_id 2339221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2339221
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*
9
reference_url https://www.oracle.com/security-alerts/cpujan2025.html
reference_id cpujan2025.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T19:32:41Z/
url https://www.oracle.com/security-alerts/cpujan2025.html
10
reference_url https://access.redhat.com/errata/RHSA-2025:1671
reference_id RHSA-2025:1671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1671
11
reference_url https://access.redhat.com/errata/RHSA-2025:1673
reference_id RHSA-2025:1673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1673
12
reference_url https://access.redhat.com/errata/RHSA-2025:19572
reference_id RHSA-2025:19572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19572
13
reference_url https://access.redhat.com/errata/RHSA-2025:19584
reference_id RHSA-2025:19584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19584
14
reference_url https://access.redhat.com/errata/RHSA-2026:0247
reference_id RHSA-2026:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0247
15
reference_url https://access.redhat.com/errata/RHSA-2026:0334
reference_id RHSA-2026:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0334
16
reference_url https://access.redhat.com/errata/RHSA-2026:0335
reference_id RHSA-2026:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0335
17
reference_url https://access.redhat.com/errata/RHSA-2026:6435
reference_id RHSA-2026:6435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6435
18
reference_url https://usn.ubuntu.com/7245-1/
reference_id USN-7245-1
reference_type
scores
url https://usn.ubuntu.com/7245-1/
19
reference_url https://usn.ubuntu.com/7376-1/
reference_id USN-7376-1
reference_type
scores
url https://usn.ubuntu.com/7376-1/
20
reference_url https://usn.ubuntu.com/7376-2/
reference_id USN-7376-2
reference_type
scores
url https://usn.ubuntu.com/7376-2/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.28-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2025-21490
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jpqr-hknn-6fd9
41
url VCID-k6rd-6zrp-ffbm
vulnerability_id VCID-k6rd-6zrp-ffbm
summary
A vulnerability has been discovered in MariaDB which could result
    in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15180.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15180
reference_id
reference_type
scores
0
value 0.04602
scoring_system epss
scoring_elements 0.89202
published_at 2026-04-01T12:55:00Z
1
value 0.04602
scoring_system epss
scoring_elements 0.89208
published_at 2026-04-02T12:55:00Z
2
value 0.04602
scoring_system epss
scoring_elements 0.89222
published_at 2026-04-04T12:55:00Z
3
value 0.04602
scoring_system epss
scoring_elements 0.89225
published_at 2026-04-07T12:55:00Z
4
value 0.04602
scoring_system epss
scoring_elements 0.89243
published_at 2026-04-08T12:55:00Z
5
value 0.04602
scoring_system epss
scoring_elements 0.89248
published_at 2026-04-09T12:55:00Z
6
value 0.04602
scoring_system epss
scoring_elements 0.89257
published_at 2026-04-11T12:55:00Z
7
value 0.04602
scoring_system epss
scoring_elements 0.89253
published_at 2026-04-12T12:55:00Z
8
value 0.04602
scoring_system epss
scoring_elements 0.8925
published_at 2026-04-13T12:55:00Z
9
value 0.04602
scoring_system epss
scoring_elements 0.89263
published_at 2026-04-18T12:55:00Z
10
value 0.04602
scoring_system epss
scoring_elements 0.89258
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1894919
reference_id 1894919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1894919
5
reference_url https://security.gentoo.org/glsa/202011-14
reference_id GLSA-202011-14
reference_type
scores
url https://security.gentoo.org/glsa/202011-14
6
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
7
reference_url https://access.redhat.com/errata/RHSA-2020:5379
reference_id RHSA-2020:5379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5379
8
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
9
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
10
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
11
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
12
reference_url https://usn.ubuntu.com/4603-1/
reference_id USN-4603-1
reference_type
scores
url https://usn.ubuntu.com/4603-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.6-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.6-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.6-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2020-15180
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6rd-6zrp-ffbm
42
url VCID-kcxa-pm2w-5qd9
vulnerability_id VCID-kcxa-pm2w-5qd9
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27378.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27378
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.58289
published_at 2026-04-02T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58309
published_at 2026-04-04T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58284
published_at 2026-04-07T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58337
published_at 2026-04-08T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58343
published_at 2026-04-09T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58361
published_at 2026-04-11T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58338
published_at 2026-04-12T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58318
published_at 2026-04-13T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58351
published_at 2026-04-16T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58354
published_at 2026-04-18T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58331
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074949
reference_id 2074949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074949
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27378
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kcxa-pm2w-5qd9
43
url VCID-kw4q-mtgs-j3gs
vulnerability_id VCID-kw4q-mtgs-j3gs
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27451.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27451
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33075
published_at 2026-04-02T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33107
published_at 2026-04-04T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.32937
published_at 2026-04-07T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.32982
published_at 2026-04-08T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33012
published_at 2026-04-09T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33015
published_at 2026-04-11T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.32976
published_at 2026-04-12T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.32952
published_at 2026-04-13T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.32994
published_at 2026-04-16T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.32973
published_at 2026-04-18T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.32936
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27451
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2076144
reference_id 2076144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2076144
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27451
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kw4q-mtgs-j3gs
44
url VCID-m6nu-xhk5-7kf4
vulnerability_id VCID-m6nu-xhk5-7kf4
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27457.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27457
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33075
published_at 2026-04-02T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33107
published_at 2026-04-04T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.32937
published_at 2026-04-07T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.32982
published_at 2026-04-08T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33012
published_at 2026-04-09T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33015
published_at 2026-04-11T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.32976
published_at 2026-04-12T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.32952
published_at 2026-04-13T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.32994
published_at 2026-04-16T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.32973
published_at 2026-04-18T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.32936
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27457
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075699
reference_id 2075699
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075699
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27457
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6nu-xhk5-7kf4
45
url VCID-mpbk-tjrm-pufu
vulnerability_id VCID-mpbk-tjrm-pufu
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46665.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46665
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12631
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12683
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12651
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1261
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12565
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12471
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12477
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050026
reference_id 2050026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050026
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46665
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mpbk-tjrm-pufu
46
url VCID-mz73-138k-v7h5
vulnerability_id VCID-mz73-138k-v7h5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27376.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27376
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55423
published_at 2026-04-02T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55447
published_at 2026-04-04T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55426
published_at 2026-04-07T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55477
published_at 2026-04-09T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55487
published_at 2026-04-11T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55466
published_at 2026-04-12T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55449
published_at 2026-04-13T12:55:00Z
7
value 0.00324
scoring_system epss
scoring_elements 0.55485
published_at 2026-04-16T12:55:00Z
8
value 0.00324
scoring_system epss
scoring_elements 0.55488
published_at 2026-04-18T12:55:00Z
9
value 0.00324
scoring_system epss
scoring_elements 0.55467
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27376
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074817
reference_id 2074817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074817
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27376
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mz73-138k-v7h5
47
url VCID-nfc7-vsbw-yugg
vulnerability_id VCID-nfc7-vsbw-yugg
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27449.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27449.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27449
reference_id
reference_type
scores
0
value 0.00245
scoring_system epss
scoring_elements 0.47709
published_at 2026-04-02T12:55:00Z
1
value 0.00245
scoring_system epss
scoring_elements 0.4773
published_at 2026-04-09T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.4768
published_at 2026-04-07T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.47734
published_at 2026-04-08T12:55:00Z
4
value 0.00245
scoring_system epss
scoring_elements 0.47755
published_at 2026-04-11T12:55:00Z
5
value 0.00245
scoring_system epss
scoring_elements 0.47732
published_at 2026-04-12T12:55:00Z
6
value 0.00245
scoring_system epss
scoring_elements 0.47742
published_at 2026-04-13T12:55:00Z
7
value 0.00245
scoring_system epss
scoring_elements 0.47796
published_at 2026-04-16T12:55:00Z
8
value 0.00245
scoring_system epss
scoring_elements 0.4779
published_at 2026-04-18T12:55:00Z
9
value 0.00245
scoring_system epss
scoring_elements 0.47741
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27449
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075695
reference_id 2075695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075695
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27449
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nfc7-vsbw-yugg
48
url VCID-nw1y-ajx5-ebej
vulnerability_id VCID-nw1y-ajx5-ebej
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31623.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31623
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09536
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09627
published_at 2026-04-21T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09621
published_at 2026-04-09T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09628
published_at 2026-04-11T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09598
published_at 2026-04-12T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09582
published_at 2026-04-13T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09475
published_at 2026-04-16T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09478
published_at 2026-04-18T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09585
published_at 2026-04-04T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09498
published_at 2026-04-07T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09573
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/MariaDB/server/pull/1938
reference_id 1938
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://github.com/MariaDB/server/pull/1938
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092360
reference_id 2092360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092360
6
reference_url https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
reference_id 7c30bc38a588b22b01f11130cfe99e7f36accf94
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
7
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
8
reference_url https://jira.mariadb.org/browse/MDEV-26561
reference_id MDEV-26561
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://jira.mariadb.org/browse/MDEV-26561
9
reference_url https://jira.mariadb.org/browse/MDEV-26574
reference_id MDEV-26574
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://jira.mariadb.org/browse/MDEV-26574
10
reference_url https://security.netapp.com/advisory/ntap-20220707-0006/
reference_id ntap-20220707-0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/
url https://security.netapp.com/advisory/ntap-20220707-0006/
11
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
12
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
13
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
14
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
15
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-31623
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw1y-ajx5-ebej
49
url VCID-p152-cnc6-5qcn
vulnerability_id VCID-p152-cnc6-5qcn
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27386.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27386.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27386
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57373
published_at 2026-04-02T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57394
published_at 2026-04-04T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.5737
published_at 2026-04-07T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57423
published_at 2026-04-08T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57425
published_at 2026-04-09T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57441
published_at 2026-04-11T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57419
published_at 2026-04-12T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.574
published_at 2026-04-13T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57426
published_at 2026-04-16T12:55:00Z
9
value 0.00348
scoring_system epss
scoring_elements 0.57422
published_at 2026-04-18T12:55:00Z
10
value 0.00348
scoring_system epss
scoring_elements 0.57401
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27386
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075005
reference_id 2075005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075005
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27386
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p152-cnc6-5qcn
50
url VCID-pk23-a5y3-4ub5
vulnerability_id VCID-pk23-a5y3-4ub5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31621
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09534
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09625
published_at 2026-04-21T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09584
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09497
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09572
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09619
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09626
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09596
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.0958
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09473
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09477
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31621
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092353
reference_id 2092353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092353
5
reference_url https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
reference_id b1351c15946349f9daa7e5297fb2ac6f3139e4a8
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
6
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
7
reference_url https://jira.mariadb.org/browse/MDEV-26561
reference_id MDEV-26561
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://jira.mariadb.org/browse/MDEV-26561
8
reference_url https://jira.mariadb.org/browse/MDEV-26574
reference_id MDEV-26574
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://jira.mariadb.org/browse/MDEV-26574
9
reference_url https://jira.mariadb.org/browse/MDEV-26574?filter=-2
reference_id MDEV-26574?filter=-2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://jira.mariadb.org/browse/MDEV-26574?filter=-2
10
reference_url https://security.netapp.com/advisory/ntap-20220707-0006/
reference_id ntap-20220707-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://security.netapp.com/advisory/ntap-20220707-0006/
11
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
12
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
13
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
14
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
15
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-31621
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pk23-a5y3-4ub5
51
url VCID-pkew-29au-ukac
vulnerability_id VCID-pkew-29au-ukac
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46664.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46664
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12631
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12683
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12651
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1261
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12565
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12471
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12477
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050024
reference_id 2050024
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050024
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46664
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pkew-29au-ukac
52
url VCID-pmhc-1rhq-gfeb
vulnerability_id VCID-pmhc-1rhq-gfeb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14765
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82525
published_at 2026-04-01T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.82539
published_at 2026-04-02T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.82629
published_at 2026-04-21T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82554
published_at 2026-04-04T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.8255
published_at 2026-04-07T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82576
published_at 2026-04-08T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-09T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82602
published_at 2026-04-11T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.82596
published_at 2026-04-12T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.82589
published_at 2026-04-13T12:55:00Z
10
value 0.01757
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890738
reference_id 1890738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890738
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
reference_id GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
9
reference_url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
reference_id O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
12
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
13
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
14
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
15
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
16
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
17
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
18
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
19
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
reference_id ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2020-14765
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb
53
url VCID-pys7-779g-fqf6
vulnerability_id VCID-pys7-779g-fqf6
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27456.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27456
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33877
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33909
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33763
published_at 2026-04-07T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33806
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.3384
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33837
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33795
published_at 2026-04-12T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33771
published_at 2026-04-13T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33808
published_at 2026-04-16T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33794
published_at 2026-04-18T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33761
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075697
reference_id 2075697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075697
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27456
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pys7-779g-fqf6
54
url VCID-qe1p-f4h5-uyga
vulnerability_id VCID-qe1p-f4h5-uyga
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14812
reference_id
reference_type
scores
0
value 0.01394
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-01T12:55:00Z
1
value 0.01394
scoring_system epss
scoring_elements 0.80338
published_at 2026-04-02T12:55:00Z
2
value 0.01394
scoring_system epss
scoring_elements 0.80417
published_at 2026-04-21T12:55:00Z
3
value 0.01394
scoring_system epss
scoring_elements 0.80358
published_at 2026-04-04T12:55:00Z
4
value 0.01394
scoring_system epss
scoring_elements 0.80347
published_at 2026-04-07T12:55:00Z
5
value 0.01394
scoring_system epss
scoring_elements 0.80376
published_at 2026-04-08T12:55:00Z
6
value 0.01394
scoring_system epss
scoring_elements 0.80386
published_at 2026-04-09T12:55:00Z
7
value 0.01394
scoring_system epss
scoring_elements 0.80405
published_at 2026-04-11T12:55:00Z
8
value 0.01394
scoring_system epss
scoring_elements 0.8039
published_at 2026-04-12T12:55:00Z
9
value 0.01394
scoring_system epss
scoring_elements 0.80383
published_at 2026-04-13T12:55:00Z
10
value 0.01394
scoring_system epss
scoring_elements 0.80412
published_at 2026-04-16T12:55:00Z
11
value 0.01394
scoring_system epss
scoring_elements 0.80413
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890756
reference_id 1890756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890756
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
reference_id 972623
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
reference_id JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/
8
reference_url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
reference_id OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/
10
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
11
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
12
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
13
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
14
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
15
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
16
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
17
reference_url https://usn.ubuntu.com/4604-1/
reference_id USN-4604-1
reference_type
scores
url https://usn.ubuntu.com/4604-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2020-14812
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga
55
url VCID-qv7j-a4nn-97f7
vulnerability_id VCID-qv7j-a4nn-97f7
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2389
reference_id
reference_type
scores
0
value 0.00552
scoring_system epss
scoring_elements 0.67956
published_at 2026-04-01T12:55:00Z
1
value 0.00552
scoring_system epss
scoring_elements 0.6805
published_at 2026-04-21T12:55:00Z
2
value 0.00552
scoring_system epss
scoring_elements 0.67979
published_at 2026-04-02T12:55:00Z
3
value 0.00552
scoring_system epss
scoring_elements 0.67998
published_at 2026-04-04T12:55:00Z
4
value 0.00552
scoring_system epss
scoring_elements 0.67977
published_at 2026-04-07T12:55:00Z
5
value 0.00552
scoring_system epss
scoring_elements 0.68028
published_at 2026-04-08T12:55:00Z
6
value 0.00552
scoring_system epss
scoring_elements 0.68042
published_at 2026-04-09T12:55:00Z
7
value 0.00552
scoring_system epss
scoring_elements 0.68066
published_at 2026-04-11T12:55:00Z
8
value 0.00552
scoring_system epss
scoring_elements 0.68052
published_at 2026-04-12T12:55:00Z
9
value 0.00552
scoring_system epss
scoring_elements 0.68017
published_at 2026-04-13T12:55:00Z
10
value 0.00552
scoring_system epss
scoring_elements 0.68054
published_at 2026-04-16T12:55:00Z
11
value 0.00552
scoring_system epss
scoring_elements 0.68067
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2389
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992309
reference_id 1992309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992309
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://security.archlinux.org/AVG-2226
reference_id AVG-2226
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2226
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
10
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
11
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
12
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
13
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
14
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
15
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
16
reference_url https://usn.ubuntu.com/5022-2/
reference_id USN-5022-2
reference_type
scores
url https://usn.ubuntu.com/5022-2/
17
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
19
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-880/
reference_id ZDI-21-880
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-880/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.12-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.12-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.12-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-2389
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7j-a4nn-97f7
56
url VCID-r9tj-2m3h-a7fh
vulnerability_id VCID-r9tj-2m3h-a7fh
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32089.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32089.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32089
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33209
published_at 2026-04-02T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33241
published_at 2026-04-04T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.33073
published_at 2026-04-07T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.33116
published_at 2026-04-08T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.3315
published_at 2026-04-09T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33152
published_at 2026-04-11T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.33113
published_at 2026-04-12T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.3309
published_at 2026-04-13T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.33131
published_at 2026-04-16T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.33108
published_at 2026-04-18T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.33069
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106035
reference_id 2106035
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106035
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2023:5683
reference_id RHSA-2023:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5683
7
reference_url https://access.redhat.com/errata/RHSA-2023:5684
reference_id RHSA-2023:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5684
8
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
9
reference_url https://access.redhat.com/errata/RHSA-2023:6822
reference_id RHSA-2023:6822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6822
10
reference_url https://access.redhat.com/errata/RHSA-2023:6883
reference_id RHSA-2023:6883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6883
11
reference_url https://access.redhat.com/errata/RHSA-2023:7633
reference_id RHSA-2023:7633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7633
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32089
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9tj-2m3h-a7fh
57
url VCID-rf1r-a5xx-akb3
vulnerability_id VCID-rf1r-a5xx-akb3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2022
reference_id
reference_type
scores
0
value 0.0048
scoring_system epss
scoring_elements 0.64986
published_at 2026-04-01T12:55:00Z
1
value 0.0048
scoring_system epss
scoring_elements 0.65036
published_at 2026-04-02T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65098
published_at 2026-04-21T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65064
published_at 2026-04-04T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.65025
published_at 2026-04-07T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65075
published_at 2026-04-08T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65088
published_at 2026-04-09T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65107
published_at 2026-04-11T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65096
published_at 2026-04-12T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65068
published_at 2026-04-13T12:55:00Z
10
value 0.0048
scoring_system epss
scoring_elements 0.65105
published_at 2026-04-16T12:55:00Z
11
value 0.0048
scoring_system epss
scoring_elements 0.65114
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2022
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922389
reference_id 1922389
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922389
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
8
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
9
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
10
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
11
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
12
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
13
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
14
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
16
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.5-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.5-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.5-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-2022
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3
58
url VCID-rrzq-esfe-c3ep
vulnerability_id VCID-rrzq-esfe-c3ep
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27448.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27448.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27448
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38623
published_at 2026-04-02T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.38647
published_at 2026-04-04T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.3851
published_at 2026-04-07T12:55:00Z
3
value 0.00172
scoring_system epss
scoring_elements 0.38561
published_at 2026-04-08T12:55:00Z
4
value 0.00172
scoring_system epss
scoring_elements 0.3857
published_at 2026-04-09T12:55:00Z
5
value 0.00172
scoring_system epss
scoring_elements 0.38581
published_at 2026-04-11T12:55:00Z
6
value 0.00172
scoring_system epss
scoring_elements 0.38542
published_at 2026-04-18T12:55:00Z
7
value 0.00172
scoring_system epss
scoring_elements 0.38516
published_at 2026-04-13T12:55:00Z
8
value 0.00172
scoring_system epss
scoring_elements 0.38564
published_at 2026-04-16T12:55:00Z
9
value 0.00172
scoring_system epss
scoring_elements 0.38463
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27448
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075694
reference_id 2075694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075694
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27448
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rrzq-esfe-c3ep
59
url VCID-sayh-7e6g-uqda
vulnerability_id VCID-sayh-7e6g-uqda
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27383.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27383
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46895
published_at 2026-04-02T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46912
published_at 2026-04-09T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46859
published_at 2026-04-07T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46913
published_at 2026-04-08T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46936
published_at 2026-04-11T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46909
published_at 2026-04-12T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46916
published_at 2026-04-13T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46972
published_at 2026-04-16T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46968
published_at 2026-04-18T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.46917
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27383
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074996
reference_id 2074996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074996
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27383
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sayh-7e6g-uqda
60
url VCID-sj1k-49rz-gyg9
vulnerability_id VCID-sj1k-49rz-gyg9
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27444.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27444
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.34617
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34643
published_at 2026-04-04T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34512
published_at 2026-04-07T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34554
published_at 2026-04-08T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34583
published_at 2026-04-09T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34585
published_at 2026-04-11T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34546
published_at 2026-04-12T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34521
published_at 2026-04-13T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.3456
published_at 2026-04-16T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34545
published_at 2026-04-18T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34507
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27444
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075696
reference_id 2075696
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075696
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27444
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sj1k-49rz-gyg9
61
url VCID-smhx-5fa3-4yay
vulnerability_id VCID-smhx-5fa3-4yay
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24051.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24051.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24051
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17737
published_at 2026-04-21T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.1769
published_at 2026-04-16T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.177
published_at 2026-04-18T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.1767
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17759
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17821
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17837
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17794
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17746
published_at 2026-04-13T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20659
published_at 2026-04-04T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20601
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24051
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2068233
reference_id 2068233
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2068233
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-24051
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-smhx-5fa3-4yay
62
url VCID-t3bu-199s-pfez
vulnerability_id VCID-t3bu-199s-pfez
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27382.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27382
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44447
published_at 2026-04-13T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44469
published_at 2026-04-04T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44404
published_at 2026-04-07T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44455
published_at 2026-04-08T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44462
published_at 2026-04-09T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44478
published_at 2026-04-11T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44448
published_at 2026-04-12T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44503
published_at 2026-04-16T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44495
published_at 2026-04-18T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44425
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074987
reference_id 2074987
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074987
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27382
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t3bu-199s-pfez
63
url VCID-t7g8-dt3a-yba8
vulnerability_id VCID-t7g8-dt3a-yba8
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27377.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27377
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55423
published_at 2026-04-02T12:55:00Z
1
value 0.00324
scoring_system epss
scoring_elements 0.55447
published_at 2026-04-04T12:55:00Z
2
value 0.00324
scoring_system epss
scoring_elements 0.55426
published_at 2026-04-07T12:55:00Z
3
value 0.00324
scoring_system epss
scoring_elements 0.55477
published_at 2026-04-09T12:55:00Z
4
value 0.00324
scoring_system epss
scoring_elements 0.55487
published_at 2026-04-11T12:55:00Z
5
value 0.00324
scoring_system epss
scoring_elements 0.55466
published_at 2026-04-12T12:55:00Z
6
value 0.00324
scoring_system epss
scoring_elements 0.55449
published_at 2026-04-13T12:55:00Z
7
value 0.00324
scoring_system epss
scoring_elements 0.55485
published_at 2026-04-16T12:55:00Z
8
value 0.00324
scoring_system epss
scoring_elements 0.55488
published_at 2026-04-18T12:55:00Z
9
value 0.00324
scoring_system epss
scoring_elements 0.55467
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074947
reference_id 2074947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074947
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27377
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7g8-dt3a-yba8
64
url VCID-tk47-7pwj-fkh5
vulnerability_id VCID-tk47-7pwj-fkh5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32084.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32084
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.5488
published_at 2026-04-02T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54906
published_at 2026-04-04T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54875
published_at 2026-04-07T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54925
published_at 2026-04-08T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54923
published_at 2026-04-09T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54936
published_at 2026-04-18T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54918
published_at 2026-04-12T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54895
published_at 2026-04-13T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54933
published_at 2026-04-16T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.54916
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2106034
reference_id 2106034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2106034
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2023:5259
reference_id RHSA-2023:5259
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5259
7
reference_url https://access.redhat.com/errata/RHSA-2023:5683
reference_id RHSA-2023:5683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5683
8
reference_url https://access.redhat.com/errata/RHSA-2023:5684
reference_id RHSA-2023:5684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5684
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://access.redhat.com/errata/RHSA-2023:6822
reference_id RHSA-2023:6822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6822
11
reference_url https://access.redhat.com/errata/RHSA-2023:6883
reference_id RHSA-2023:6883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6883
12
reference_url https://access.redhat.com/errata/RHSA-2023:7633
reference_id RHSA-2023:7633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7633
13
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32084
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tk47-7pwj-fkh5
65
url VCID-tzj1-mvp6-wqga
vulnerability_id VCID-tzj1-mvp6-wqga
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27445.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27445.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27445
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54283
published_at 2026-04-02T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54313
published_at 2026-04-04T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54288
published_at 2026-04-07T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.5434
published_at 2026-04-08T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54335
published_at 2026-04-09T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54384
published_at 2026-04-16T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54366
published_at 2026-04-12T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54345
published_at 2026-04-13T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54389
published_at 2026-04-18T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54369
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27445
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075691
reference_id 2075691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075691
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27445
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tzj1-mvp6-wqga
66
url VCID-uhvt-x3cq-5kdw
vulnerability_id VCID-uhvt-x3cq-5kdw
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46661.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46661
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12631
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12683
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12651
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1261
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12565
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12471
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12477
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050017
reference_id 2050017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050017
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46661
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhvt-x3cq-5kdw
67
url VCID-uubt-qpt1-sua8
vulnerability_id VCID-uubt-qpt1-sua8
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46669.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46669.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46669
reference_id
reference_type
scores
0
value 0.00472
scoring_system epss
scoring_elements 0.64587
published_at 2026-04-01T12:55:00Z
1
value 0.00472
scoring_system epss
scoring_elements 0.6464
published_at 2026-04-02T12:55:00Z
2
value 0.00472
scoring_system epss
scoring_elements 0.64669
published_at 2026-04-04T12:55:00Z
3
value 0.00472
scoring_system epss
scoring_elements 0.64626
published_at 2026-04-07T12:55:00Z
4
value 0.00472
scoring_system epss
scoring_elements 0.64675
published_at 2026-04-08T12:55:00Z
5
value 0.00472
scoring_system epss
scoring_elements 0.6469
published_at 2026-04-09T12:55:00Z
6
value 0.00472
scoring_system epss
scoring_elements 0.64707
published_at 2026-04-11T12:55:00Z
7
value 0.00472
scoring_system epss
scoring_elements 0.64696
published_at 2026-04-12T12:55:00Z
8
value 0.00472
scoring_system epss
scoring_elements 0.64667
published_at 2026-04-13T12:55:00Z
9
value 0.00472
scoring_system epss
scoring_elements 0.64703
published_at 2026-04-16T12:55:00Z
10
value 0.00472
scoring_system epss
scoring_elements 0.64715
published_at 2026-04-18T12:55:00Z
11
value 0.00472
scoring_system epss
scoring_elements 0.64701
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46669
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050034
reference_id 2050034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050034
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
11
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46669
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uubt-qpt1-sua8
68
url VCID-w69n-gw41-kkdv
vulnerability_id VCID-w69n-gw41-kkdv
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46663.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46663
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.127
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12552
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12631
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12683
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12651
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1261
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12565
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12471
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12477
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050022
reference_id 2050022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050022
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5305-1/
reference_id USN-5305-1
reference_type
scores
url https://usn.ubuntu.com/5305-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46663
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w69n-gw41-kkdv
69
url VCID-wht6-gdyu-bbhy
vulnerability_id VCID-wht6-gdyu-bbhy
summary
Multiple vulnerabilities have been found in MariaDB, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27928.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27928
reference_id
reference_type
scores
0
value 0.48947
scoring_system epss
scoring_elements 0.97742
published_at 2026-04-01T12:55:00Z
1
value 0.48947
scoring_system epss
scoring_elements 0.97748
published_at 2026-04-02T12:55:00Z
2
value 0.48947
scoring_system epss
scoring_elements 0.9775
published_at 2026-04-04T12:55:00Z
3
value 0.48947
scoring_system epss
scoring_elements 0.97752
published_at 2026-04-07T12:55:00Z
4
value 0.48947
scoring_system epss
scoring_elements 0.97757
published_at 2026-04-08T12:55:00Z
5
value 0.48947
scoring_system epss
scoring_elements 0.9776
published_at 2026-04-09T12:55:00Z
6
value 0.48947
scoring_system epss
scoring_elements 0.97763
published_at 2026-04-11T12:55:00Z
7
value 0.48947
scoring_system epss
scoring_elements 0.97765
published_at 2026-04-12T12:55:00Z
8
value 0.48947
scoring_system epss
scoring_elements 0.97767
published_at 2026-04-13T12:55:00Z
9
value 0.48947
scoring_system epss
scoring_elements 0.97773
published_at 2026-04-16T12:55:00Z
10
value 0.48947
scoring_system epss
scoring_elements 0.97775
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27928
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1940909
reference_id 1940909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1940909
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/49765.txt
reference_id CVE-2021-27928
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/49765.txt
6
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
url https://security.gentoo.org/glsa/202105-28
7
reference_url https://access.redhat.com/errata/RHSA-2021:1039
reference_id RHSA-2021:1039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1039
8
reference_url https://access.redhat.com/errata/RHSA-2021:1240
reference_id RHSA-2021:1240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1240
9
reference_url https://access.redhat.com/errata/RHSA-2021:1241
reference_id RHSA-2021:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1241
10
reference_url https://access.redhat.com/errata/RHSA-2021:1242
reference_id RHSA-2021:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1242
11
reference_url https://access.redhat.com/errata/RHSA-2021:2040
reference_id RHSA-2021:2040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2040
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.9-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.9-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.9-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-27928
risk_score 10.0
exploitability 2.0
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wht6-gdyu-bbhy
70
url VCID-wvxn-ugew-u7bj
vulnerability_id VCID-wvxn-ugew-u7bj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2166
reference_id
reference_type
scores
0
value 0.01154
scoring_system epss
scoring_elements 0.78469
published_at 2026-04-01T12:55:00Z
1
value 0.01154
scoring_system epss
scoring_elements 0.78545
published_at 2026-04-21T12:55:00Z
2
value 0.01154
scoring_system epss
scoring_elements 0.78475
published_at 2026-04-02T12:55:00Z
3
value 0.01154
scoring_system epss
scoring_elements 0.78506
published_at 2026-04-04T12:55:00Z
4
value 0.01154
scoring_system epss
scoring_elements 0.78489
published_at 2026-04-07T12:55:00Z
5
value 0.01154
scoring_system epss
scoring_elements 0.78516
published_at 2026-04-08T12:55:00Z
6
value 0.01154
scoring_system epss
scoring_elements 0.78522
published_at 2026-04-09T12:55:00Z
7
value 0.01154
scoring_system epss
scoring_elements 0.78547
published_at 2026-04-11T12:55:00Z
8
value 0.01154
scoring_system epss
scoring_elements 0.78529
published_at 2026-04-12T12:55:00Z
9
value 0.01154
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-13T12:55:00Z
10
value 0.01154
scoring_system epss
scoring_elements 0.78549
published_at 2026-04-16T12:55:00Z
11
value 0.01154
scoring_system epss
scoring_elements 0.78548
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951755
reference_id 1951755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951755
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
reference_id 988428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
8
reference_url https://security.archlinux.org/ASA-202105-14
reference_id ASA-202105-14
reference_type
scores
url https://security.archlinux.org/ASA-202105-14
9
reference_url https://security.archlinux.org/AVG-1882
reference_id AVG-1882
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1882
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
reference_id DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
reference_id GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
12
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://security.gentoo.org/glsa/202105-27
13
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://security.gentoo.org/glsa/202105-28
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
reference_id PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
19
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
20
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
21
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
22
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
23
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
25
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
26
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.10-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.10-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.10-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-2166
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj
71
url VCID-wyvr-ducu-ukfq
vulnerability_id VCID-wyvr-ducu-ukfq
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46667
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11553
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11679
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11722
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11507
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11594
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11653
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11664
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11627
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.116
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11463
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11465
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46667
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050030
reference_id 2050030
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050030
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46667
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyvr-ducu-ukfq
72
url VCID-xnyt-rg5b-rket
vulnerability_id VCID-xnyt-rg5b-rket
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32083.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32083
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48094
published_at 2026-04-02T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48115
published_at 2026-04-04T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48065
published_at 2026-04-07T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48118
published_at 2026-04-08T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.48113
published_at 2026-04-09T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48136
published_at 2026-04-11T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.4811
published_at 2026-04-12T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48121
published_at 2026-04-13T12:55:00Z
8
value 0.00248
scoring_system epss
scoring_elements 0.48174
published_at 2026-04-16T12:55:00Z
9
value 0.00248
scoring_system epss
scoring_elements 0.48169
published_at 2026-04-18T12:55:00Z
10
value 0.00248
scoring_system epss
scoring_elements 0.48123
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32083
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2104425
reference_id 2104425
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2104425
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32083
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xnyt-rg5b-rket
73
url VCID-xty8-u5vt-nkgf
vulnerability_id VCID-xty8-u5vt-nkgf
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32085.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32085
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43217
published_at 2026-04-02T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.43245
published_at 2026-04-04T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43183
published_at 2026-04-07T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43235
published_at 2026-04-08T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43247
published_at 2026-04-09T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43269
published_at 2026-04-11T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43237
published_at 2026-04-12T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43221
published_at 2026-04-13T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43282
published_at 2026-04-16T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.4327
published_at 2026-04-18T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43206
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32085
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2104431
reference_id 2104431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2104431
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-32085
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xty8-u5vt-nkgf
74
url VCID-xz4d-en3t-d7hp
vulnerability_id VCID-xz4d-en3t-d7hp
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27446.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27446.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27446
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40491
published_at 2026-04-02T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40518
published_at 2026-04-04T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.4044
published_at 2026-04-07T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.4049
published_at 2026-04-08T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40502
published_at 2026-04-09T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40522
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40485
published_at 2026-04-12T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40465
published_at 2026-04-13T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40513
published_at 2026-04-16T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40482
published_at 2026-04-18T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40406
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27446
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075692
reference_id 2075692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075692
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
10
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27446
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xz4d-en3t-d7hp
75
url VCID-y9qz-gnth-87dt
vulnerability_id VCID-y9qz-gnth-87dt
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46662
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20169
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20317
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20376
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20099
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.2018
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20239
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20262
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20217
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20158
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20151
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20154
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20153
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050019
reference_id 2050019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050019
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
6
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
7
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
8
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
9
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46662
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9qz-gnth-87dt
76
url VCID-ywqs-mczx-ufh2
vulnerability_id VCID-ywqs-mczx-ufh2
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27447.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27447.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27447
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46895
published_at 2026-04-02T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46912
published_at 2026-04-09T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46859
published_at 2026-04-07T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46913
published_at 2026-04-08T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46936
published_at 2026-04-11T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46909
published_at 2026-04-12T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46916
published_at 2026-04-13T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46972
published_at 2026-04-16T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46968
published_at 2026-04-18T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.46917
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27447
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075693
reference_id 2075693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075693
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
7
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
8
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
9
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
10
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27447
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ywqs-mczx-ufh2
77
url VCID-z7ed-2j49-kfh5
vulnerability_id VCID-z7ed-2j49-kfh5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27385
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49705
published_at 2026-04-02T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49733
published_at 2026-04-04T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49684
published_at 2026-04-07T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49739
published_at 2026-04-08T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49734
published_at 2026-04-09T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49751
published_at 2026-04-11T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49723
published_at 2026-04-12T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49724
published_at 2026-04-13T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49771
published_at 2026-04-18T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49744
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27385
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075001
reference_id 2075001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075001
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.13-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.13-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.13-0%252Bdeb11u1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2022-27385
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7ed-2j49-kfh5
78
url VCID-zzhd-1eyg-muge
vulnerability_id VCID-zzhd-1eyg-muge
summary mariadb: save_window_function_values triggers an abort during IN subquery
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46658.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46658
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24198
published_at 2026-04-01T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24327
published_at 2026-04-02T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.2436
published_at 2026-04-04T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24144
published_at 2026-04-07T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.2421
published_at 2026-04-08T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24269
published_at 2026-04-11T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24226
published_at 2026-04-12T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24169
published_at 2026-04-13T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24185
published_at 2026-04-16T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24172
published_at 2026-04-18T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24149
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2049294
reference_id 2049294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2049294
5
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
6
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
7
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
8
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
9
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.11-1%3Fdistro=bullseye
1
url pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye
aliases CVE-2021-46658
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zzhd-1eyg-muge
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye