Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/930448?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "type": "deb", "namespace": "debian", "name": "mariadb-10.5", "version": "1:10.5.23-0+deb11u1", "qualifiers": { "distro": "bullseye" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1:10.5.26-0+deb11u1", "latest_non_vulnerable_version": "1:10.5.29-0+deb11u1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61743?format=api", "vulnerability_id": "VCID-27zh-jckv-xkgy", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31622.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31622.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31622", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10076", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10136", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10034", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.1011", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10171", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.1021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10001", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10131", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10106", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092354", "reference_id": "2092354", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092354" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-31622" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-27zh-jckv-xkgy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80469?format=api", "vulnerability_id": "VCID-2n1a-mq7k-r3fj", "summary": "mariadb: assertion failures in decimal_bin_size", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27387.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27387.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47844", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47865", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47814", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47866", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47862", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47886", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47873", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47927", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47921", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47874", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47857", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27387" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075006", "reference_id": "2075006", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27387" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2n1a-mq7k-r3fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61713?format=api", "vulnerability_id": "VCID-33z5-5vrs-7ud3", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24050.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24050.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24050", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21394", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21571", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21541", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2165", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21624", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21564", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24235", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24199", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069833", "reference_id": "2069833", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069833" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-24050" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-33z5-5vrs-7ud3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79962?format=api", "vulnerability_id": "VCID-36fa-z98h-3yfk", "summary": "mysql: InnoDB unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43022", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42938", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43036", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43071", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.4308", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43068", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43004", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101", "reference_id": "2016101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/", "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://usn.ubuntu.com/5123-2/", "reference_id": "USN-5123-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-2/" }, { "reference_url": "https://usn.ubuntu.com/5170-1/", "reference_id": "USN-5170-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5170-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/", "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-35604" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70816?format=api", "vulnerability_id": "VCID-3tgc-def7-zufy", "summary": "mariadb: MariaDB Server Crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52971", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15739", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19477", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19326", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21263", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24571", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30031", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52971" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437", "reference_id": "1100437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350917", "reference_id": "2350917", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350917" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32084", "reference_id": "MDEV-32084", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:07Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32084" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930451?format=api", "purl": "pkg:deb/debian/mariadb-10.5@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2023-52971" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3tgc-def7-zufy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61738?format=api", "vulnerability_id": "VCID-43t8-end1-9fb5", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27455.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27455.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27455", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32937", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33015", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32976", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32973", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32936", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32788", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075701", "reference_id": "2075701", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075701" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27455" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43t8-end1-9fb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70815?format=api", "vulnerability_id": "VCID-45ah-27q3-tbbh", "summary": "mariadb: MariaDB Server Crash Due to Empty Backtrace Log", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52969", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43348", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47684", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56598", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56504", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60574", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437", "reference_id": "1100437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350916", "reference_id": "2350916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350916" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32083", "reference_id": "MDEV-32083", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T15:57:59Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930462?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u2?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.28-0%252Bdeb11u2%3Fdistro=bullseye" } ], "aliases": [ "CVE-2023-52969" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45ah-27q3-tbbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80311?format=api", "vulnerability_id": "VCID-4buk-e1hz-67gv", "summary": "mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46657.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20903", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21053", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20902", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20963", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2098", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20936", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20882", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20873", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20874", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20854", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20727", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049305", "reference_id": "2049305", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930457?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.11-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46657" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4buk-e1hz-67gv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57003?format=api", "vulnerability_id": "VCID-4msq-13an-d7cb", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7666", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76555", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76587", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76598", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76604", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76594", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76636", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7664", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747", "reference_id": "1890747", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/", "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/", "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-14789" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61746?format=api", "vulnerability_id": "VCID-5142-jmqx-zffm", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32081.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32081.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32081", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33209", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33241", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33073", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3315", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33152", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33113", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3309", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33131", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33108", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33069", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3292", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32081" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106028", "reference_id": "2106028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106028" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683", "reference_id": "RHSA-2023:5683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684", "reference_id": "RHSA-2023:5684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822", "reference_id": "RHSA-2023:6822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883", "reference_id": "RHSA-2023:6883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633", "reference_id": "RHSA-2023:7633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7633" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32081" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5142-jmqx-zffm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61710?format=api", "vulnerability_id": "VCID-525u-kpee-auhh", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46668.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10528", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10673", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10737", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10594", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10723", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10706", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10541", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10557", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10686", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10637", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050032", "reference_id": "2050032", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050032" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46668" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-525u-kpee-auhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80310?format=api", "vulnerability_id": "VCID-5hbe-vqqs-sbav", "summary": "mariadb: Crash executing query with VIEW, aggregate and subquery", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46659.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46659.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46659", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11709", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11831", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11873", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11659", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11744", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11797", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11808", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1177", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11608", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11607", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1173", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1169", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049302", "reference_id": "2049302", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46659" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5hbe-vqqs-sbav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56999?format=api", "vulnerability_id": "VCID-5sgr-q6mn-u7gq", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7666", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76555", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76587", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76598", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76604", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76594", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76636", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7664", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743", "reference_id": "1890743", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/", "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/", "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-14776" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78013?format=api", "vulnerability_id": "VCID-6atg-7j6k-dkhp", "summary": "mysql: InnoDB unspecified vulnerability (CPU Oct 2023)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22084", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.8013", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.8015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80138", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80174", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80193", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80178", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80198", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.802", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80229", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034", "reference_id": "1055034", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245023", "reference_id": "2245023", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0739", "reference_id": "RHSA-2025:0739", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0739" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0914", "reference_id": "RHSA-2025:0914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0914" }, { "reference_url": "https://usn.ubuntu.com/6459-1/", "reference_id": "USN-6459-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6459-1/" }, { "reference_url": "https://usn.ubuntu.com/6583-1/", "reference_id": "USN-6583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6583-1/" }, { "reference_url": "https://usn.ubuntu.com/6600-1/", "reference_id": "USN-6600-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6600-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2023-22084" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6atg-7j6k-dkhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61737?format=api", "vulnerability_id": "VCID-6uu4-2sn3-1fex", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27452.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27452.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27452", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33877", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33763", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33806", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3384", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33837", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33795", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33771", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33808", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33794", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33761", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33394", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27452" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076145", "reference_id": "2076145", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076145" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27452" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6uu4-2sn3-1fex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61719?format=api", "vulnerability_id": "VCID-71sp-67qb-g7c1", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27379.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27379.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27379", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4427", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58289", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58343", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58338", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58318", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58354", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58331", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27379" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074951", "reference_id": "2074951", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074951" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27379" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-71sp-67qb-g7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61720?format=api", "vulnerability_id": "VCID-75zq-85c3-jfc5", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27380.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27380.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27380", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52892", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65617", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65584", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65661", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65674", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65656", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074966", "reference_id": "2074966", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074966" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27380" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75zq-85c3-jfc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70817?format=api", "vulnerability_id": "VCID-7awt-vh1g-3fdj", "summary": "mariadb: MariaDB Server Crash via Item_direct_view_ref", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52970", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43348", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47684", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48738", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56598", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56504", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437", "reference_id": "1100437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350918", "reference_id": "2350918", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350918" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32086", "reference_id": "MDEV-32086", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:41Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930462?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u2?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.28-0%252Bdeb11u2%3Fdistro=bullseye" } ], "aliases": [ "CVE-2023-52970" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7awt-vh1g-3fdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61708?format=api", "vulnerability_id": "VCID-844r-9np7-k7c8", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46666.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19564", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19705", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19754", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19479", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19614", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19566", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19508", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19474", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19482", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19494", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19385", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050028", "reference_id": "2050028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050028" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930457?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.11-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46666" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-844r-9np7-k7c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70374?format=api", "vulnerability_id": "VCID-9c35-pmbb-efe9", "summary": "mysql: mariadb: InnoDB unspecified vulnerability (CPU Apr 2025)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30693", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51467", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51415", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51469", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58627", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58573", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58609", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58622", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385", "reference_id": "1103385", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976", "reference_id": "1105976", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359963", "reference_id": "2359963", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359963" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2025.html", "reference_id": "cpuapr2025.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:23:08Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15699", "reference_id": "RHSA-2025:15699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16046", "reference_id": "RHSA-2025:16046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16086", "reference_id": "RHSA-2025:16086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16861", "reference_id": "RHSA-2025:16861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7479-1/", "reference_id": "USN-7479-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7479-1/" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930465?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.29-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.29-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2025-30693" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9c35-pmbb-efe9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80783?format=api", "vulnerability_id": "VCID-9cj5-1s7j-2bhz", "summary": "mariadb: Named pipe permission issue on Windows", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28912.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28912.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28912", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.3014", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.3", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.3006", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30096", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30101", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30057", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30008", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30023", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30003", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29959", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29886", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28912" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899332", "reference_id": "1899332", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899332" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930451?format=api", "purl": "pkg:deb/debian/mariadb-10.5@0?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@0%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-28912" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9cj5-1s7j-2bhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80394?format=api", "vulnerability_id": "VCID-9dt5-yek1-wfg9", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2194", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78612", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78715", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.7863", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78656", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78688", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78661", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.7869", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78684", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951764", "reference_id": "1951764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951764" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-2194" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9dt5-yek1-wfg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61715?format=api", "vulnerability_id": "VCID-9ef6-tbwp-pbct", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24052.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24052.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24052", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1988", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1999", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20035", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20094", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20067", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20009", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19991", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.2275", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22706", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24052" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068211", "reference_id": "2068211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068211" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-24052" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ef6-tbwp-pbct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70364?format=api", "vulnerability_id": "VCID-a732-u6ue-57h5", "summary": "mysql: mariadb: mysqldump unspecified vulnerability (CPU Apr 2025)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56586", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56693", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56649", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.5665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57084", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57136", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385", "reference_id": "1103385", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976", "reference_id": "1105976", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359885", "reference_id": "2359885", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359885" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2025.html", "reference_id": "cpuapr2025.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-17T13:37:19Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15699", "reference_id": "RHSA-2025:15699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16046", "reference_id": "RHSA-2025:16046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16086", "reference_id": "RHSA-2025:16086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16861", "reference_id": "RHSA-2025:16861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7479-1/", "reference_id": "USN-7479-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7479-1/" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930465?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.29-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.29-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2025-30722" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a732-u6ue-57h5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61712?format=api", "vulnerability_id": "VCID-b3mn-83vb-jbdw", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24048.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24048.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24048", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1988", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1999", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20035", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20094", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20067", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20009", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19991", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.2275", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22706", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068234", "reference_id": "2068234", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068234" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-24048" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3mn-83vb-jbdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61752?format=api", "vulnerability_id": "VCID-b95t-t1d4-kfda", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50624", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50651", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50606", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5066", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50656", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50699", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50676", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50661", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50702", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50708", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50687", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50635", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32088" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32088" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106008", "reference_id": "2106008", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106008" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32088" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b95t-t1d4-kfda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61747?format=api", "vulnerability_id": "VCID-bufd-a3f4-7ucf", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32082.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32082.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32082", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39126", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39046", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39101", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39117", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39129", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39092", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39072", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39128", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39097", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39009", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38802", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32082" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106030", "reference_id": "2106030", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106030" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683", "reference_id": "RHSA-2023:5683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684", "reference_id": "RHSA-2023:5684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822", "reference_id": "RHSA-2023:6822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883", "reference_id": "RHSA-2023:6883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633", "reference_id": "RHSA-2023:7633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7633" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32082" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bufd-a3f4-7ucf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61756?format=api", "vulnerability_id": "VCID-c45y-pbjr-73ez", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47015.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47015.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47015", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44719", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44615", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44739", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44677", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.4473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44732", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44718", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44765", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00221", "scoring_system": "epss", "scoring_elements": "0.44695", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034889", "reference_id": "1034889", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034889" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163609", "reference_id": "2163609", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163609" }, { "reference_url": "https://github.com/MariaDB/server/commit/be0a46b3d52b58956fd0d47d040b9f4514406954", "reference_id": "be0a46b3d52b58956fd0d47d040b9f4514406954", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/" } ], "url": "https://github.com/MariaDB/server/commit/be0a46b3d52b58956fd0d47d040b9f4514406954" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00005.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230309-0009/", "reference_id": "ntap-20230309-0009", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230309-0009/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/", "reference_id": "O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5259", "reference_id": "RHSA-2023:5259", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5259" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683", "reference_id": "RHSA-2023:5683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684", "reference_id": "RHSA-2023:5684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822", "reference_id": "RHSA-2023:6822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883", "reference_id": "RHSA-2023:6883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633", "reference_id": "RHSA-2023:7633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7633" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU/", "reference_id": "SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU/" }, { "reference_url": "https://usn.ubuntu.com/6600-1/", "reference_id": "USN-6600-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6600-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930460?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.20-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.20-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-47015" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c45y-pbjr-73ez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61724?format=api", "vulnerability_id": "VCID-c4ag-ndpx-kbcv", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27384.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27384.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4427", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58289", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58343", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58338", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58318", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58354", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58331", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074999", "reference_id": "2074999", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074999" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27384" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4ag-ndpx-kbcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61755?format=api", "vulnerability_id": "VCID-cnw5-r38y-4uc5", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38791.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38791.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38791", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10363", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10314", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10387", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1045", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1048", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10436", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10414", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10284", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10255", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10369", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38791" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130105", "reference_id": "2130105", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130105" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5259", "reference_id": "RHSA-2023:5259", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5259" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683", "reference_id": "RHSA-2023:5683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684", "reference_id": "RHSA-2023:5684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822", "reference_id": "RHSA-2023:6822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883", "reference_id": "RHSA-2023:6883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633", "reference_id": "RHSA-2023:7633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7633" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-38791" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cnw5-r38y-4uc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61751?format=api", "vulnerability_id": "VCID-d4g3-12ak-aybw", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32086.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32086.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32086", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30063", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.3011", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29923", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29985", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30025", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.2998", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29931", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29947", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29927", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29879", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29803", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32086" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32086", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32086" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104433", "reference_id": "2104433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104433" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32086" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d4g3-12ak-aybw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76869?format=api", "vulnerability_id": "VCID-dxbv-e8pq-p7ew", "summary": "mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21096.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21096.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21096", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31301", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31259", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31121", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31205", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.3121", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31167", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31123", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31156", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31136", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31104", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31452", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21096" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21096" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189", "reference_id": "1069189", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275452", "reference_id": "2275452", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275452" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/", "reference_id": "CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html", "reference_id": "cpuapr2024.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2024.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/", "reference_id": "KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0013/", "reference_id": "ntap-20240426-0013", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240426-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0737", "reference_id": "RHSA-2025:0737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0739", "reference_id": "RHSA-2025:0739", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0739" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0912", "reference_id": "RHSA-2025:0912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0912" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0914", "reference_id": "RHSA-2025:0914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://usn.ubuntu.com/6823-1/", "reference_id": "USN-6823-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6823-1/" }, { "reference_url": "https://usn.ubuntu.com/6839-1/", "reference_id": "USN-6839-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6839-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930463?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.26-0%2Bdeb11u2?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.26-0%252Bdeb11u2%3Fdistro=bullseye" } ], "aliases": [ "CVE-2024-21096" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dxbv-e8pq-p7ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57163?format=api", "vulnerability_id": "VCID-eakf-rhk4-m3g8", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2154", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22765", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22662", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.2265", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22707", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22726", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22675", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.226", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24756", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951752", "reference_id": "1951752", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951752" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428", "reference_id": "988428", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428" }, { "reference_url": "https://security.archlinux.org/ASA-202105-14", "reference_id": "ASA-202105-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-14" }, { "reference_url": "https://security.archlinux.org/AVG-1882", "reference_id": "AVG-1882", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1882" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/", "reference_id": "DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/", "reference_id": "GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.gentoo.org/glsa/202105-28", "reference_id": "GLSA-202105-28", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/" } ], "url": "https://security.gentoo.org/glsa/202105-28" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/", "reference_id": "PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930453?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.10-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.10-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-2154" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eakf-rhk4-m3g8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61721?format=api", "vulnerability_id": "VCID-edcd-rsx7-ykb4", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27381.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27381.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27381", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4427", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58289", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58343", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58338", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58318", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58354", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58331", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074981", "reference_id": "2074981", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074981" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27381" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edcd-rsx7-ykb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79499?format=api", "vulnerability_id": "VCID-ezwh-q7de-abey", "summary": "mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21906", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22179", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22159", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22099", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22093", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22046", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22261", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22044", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22124", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21427" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082644", "reference_id": "2082644", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082644" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:32Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-21427" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwh-q7de-abey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61745?format=api", "vulnerability_id": "VCID-g2x8-3226-jufz", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13646", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13445", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13526", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13576", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13548", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1351", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13463", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13374", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13449", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092362", "reference_id": "2092362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092362" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-31624" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g2x8-3226-jufz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80076?format=api", "vulnerability_id": "VCID-gqcf-pren-h3cm", "summary": "mariadb: server crash in Item_args::walk_args", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32087.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32087.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32087", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76334", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76344", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.7639", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76416", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76394", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76389", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76429", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76435", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76419", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00952", "scoring_system": "epss", "scoring_elements": "0.76453", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32087" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32087", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32087" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104434", "reference_id": "2104434", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32087" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqcf-pren-h3cm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61754?format=api", "vulnerability_id": "VCID-gqcv-pefj-43au", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32091.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32091.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32091", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54906", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54875", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54925", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54936", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54918", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54933", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54916", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5489", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32091" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106042", "reference_id": "2106042", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106042" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5259", "reference_id": "RHSA-2023:5259", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5259" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683", "reference_id": "RHSA-2023:5683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684", "reference_id": "RHSA-2023:5684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822", "reference_id": "RHSA-2023:6822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883", "reference_id": "RHSA-2023:6883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633", "reference_id": "RHSA-2023:7633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7633" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32091" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqcv-pefj-43au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80148?format=api", "vulnerability_id": "VCID-j734-hefa-1yaa", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49828", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49888", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49865", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49893", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.4991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49882", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49883", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49928", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49929", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49901", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992303", "reference_id": "1992303", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992303" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/", "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://security.archlinux.org/AVG-2226", "reference_id": "AVG-2226", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2226" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-2/", "reference_id": "USN-5022-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-2/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/", "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930454?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.12-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.12-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-2372" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j734-hefa-1yaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70814?format=api", "vulnerability_id": "VCID-jed2-gwqr-zbed", "summary": "mariadb: Crash in MariaDB Due to Improper Handling of Derived Tables", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52968.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52968.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52968", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05343", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05153", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05305", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06339", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27483", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27594", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27598", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27554", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27497", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27654", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52968" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350915", "reference_id": "2350915", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350915" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32082", "reference_id": "MDEV-32082", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T15:58:35Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32082" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930461?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.26-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.26-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2023-52968" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jed2-gwqr-zbed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71988?format=api", "vulnerability_id": "VCID-jpqr-hknn-6fd9", "summary": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21490.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-21490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53099", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53082", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57407", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57478", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57474", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57453", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60225", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.6024", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60175", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60941", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63593", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0045", "scoring_system": "epss", "scoring_elements": "0.63619", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-21490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877", "reference_id": "1093877", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221", "reference_id": "2339221", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2025.html", "reference_id": "cpujan2025.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T19:32:41Z/" } ], "url": "https://www.oracle.com/security-alerts/cpujan2025.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1671", "reference_id": "RHSA-2025:1671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1673", "reference_id": "RHSA-2025:1673", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1673" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7245-1/", "reference_id": "USN-7245-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7245-1/" }, { "reference_url": "https://usn.ubuntu.com/7376-1/", "reference_id": "USN-7376-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7376-1/" }, { "reference_url": "https://usn.ubuntu.com/7376-2/", "reference_id": "USN-7376-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7376-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930464?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.28-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2025-21490" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jpqr-hknn-6fd9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41457?format=api", "vulnerability_id": "VCID-k6rd-6zrp-ffbm", "summary": "A vulnerability has been discovered in MariaDB which could result\n in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15180.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89202", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89208", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89225", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89243", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89248", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89253", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.8925", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89263", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89258", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04602", "scoring_system": "epss", "scoring_elements": "0.89276", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894919", "reference_id": "1894919", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894919" }, { "reference_url": "https://security.gentoo.org/glsa/202011-14", "reference_id": "GLSA-202011-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5379", "reference_id": "RHSA-2020:5379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://usn.ubuntu.com/4603-1/", "reference_id": "USN-4603-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4603-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930450?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.6-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.6-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-15180" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6rd-6zrp-ffbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61718?format=api", "vulnerability_id": "VCID-kcxa-pm2w-5qd9", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27378.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27378.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27378", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4427", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58289", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58343", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58361", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58338", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58318", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58354", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58331", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074949", "reference_id": "2074949", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074949" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27378" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kcxa-pm2w-5qd9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61736?format=api", "vulnerability_id": "VCID-kw4q-mtgs-j3gs", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27451.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27451.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27451", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32937", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33015", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32976", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32973", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32936", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32788", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27451" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076144", "reference_id": "2076144", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076144" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27451" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kw4q-mtgs-j3gs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61740?format=api", "vulnerability_id": "VCID-m6nu-xhk5-7kf4", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27457.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27457.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27457", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32937", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33015", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32976", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32973", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32936", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32788", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075699", "reference_id": "2075699", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075699" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27457" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m6nu-xhk5-7kf4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61707?format=api", "vulnerability_id": "VCID-mpbk-tjrm-pufu", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46665.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12594", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.127", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12631", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12651", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12565", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12471", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12477", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12599", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050026", "reference_id": "2050026", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050026" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46665" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mpbk-tjrm-pufu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61716?format=api", "vulnerability_id": "VCID-mz73-138k-v7h5", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27376.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27376.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27376", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55423", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55477", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55487", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55466", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55449", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55488", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55467", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55389", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27376" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074817", "reference_id": "2074817", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074817" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27376" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mz73-138k-v7h5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61735?format=api", "vulnerability_id": "VCID-nfc7-vsbw-yugg", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27449.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27449.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27449", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47709", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.4773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.4768", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47734", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47755", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47732", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47796", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.4779", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47741", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47723", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27449" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075695", "reference_id": "2075695", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075695" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27449" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfc7-vsbw-yugg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61744?format=api", "vulnerability_id": "VCID-nw1y-ajx5-ebej", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31623.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09536", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09674", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09582", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09475", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09627", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09498", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09621", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/MariaDB/server/pull/1938", "reference_id": "1938", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/" } ], "url": "https://github.com/MariaDB/server/pull/1938" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092360", "reference_id": "2092360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092360" }, { "reference_url": "https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94", "reference_id": "7c30bc38a588b22b01f11130cfe99e7f36accf94", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/" } ], "url": "https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-26561", "reference_id": "MDEV-26561", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-26561" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-26574", "reference_id": "MDEV-26574", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-26574" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220707-0006/", "reference_id": "ntap-20220707-0006", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220707-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-31623" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nw1y-ajx5-ebej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61726?format=api", "vulnerability_id": "VCID-p152-cnc6-5qcn", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27386.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27386.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27386", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43287", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57373", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57394", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.5737", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57423", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57425", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57441", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57419", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.574", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57426", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57422", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57401", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27386" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075005", "reference_id": "2075005", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075005" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27386" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p152-cnc6-5qcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61742?format=api", "vulnerability_id": "VCID-pk23-a5y3-4ub5", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31621", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09534", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09672", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09497", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09572", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09619", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09626", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09596", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09473", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09477", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09625", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31621" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092353", "reference_id": "2092353", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092353" }, { "reference_url": "https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8", "reference_id": "b1351c15946349f9daa7e5297fb2ac6f3139e4a8", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/" } ], "url": "https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-26561", "reference_id": "MDEV-26561", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-26561" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-26574", "reference_id": "MDEV-26574", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-26574" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-26574?filter=-2", "reference_id": "MDEV-26574?filter=-2", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-26574?filter=-2" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220707-0006/", "reference_id": "ntap-20220707-0006", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220707-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-31621" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pk23-a5y3-4ub5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61706?format=api", "vulnerability_id": "VCID-pkew-29au-ukac", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46664.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46664.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12594", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.127", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12631", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12651", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12565", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12471", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12477", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12599", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050024", "reference_id": "2050024", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050024" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46664" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pkew-29au-ukac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56994?format=api", "vulnerability_id": "VCID-pmhc-1rhq-gfeb", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82525", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82539", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8255", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82576", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82602", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82596", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82626", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82629", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738", "reference_id": "1890738", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/", "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/", "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-14765" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61739?format=api", "vulnerability_id": "VCID-pys7-779g-fqf6", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27456.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27456.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27456", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33877", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33763", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33806", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3384", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33837", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33795", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33771", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33808", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33794", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33761", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33394", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075697", "reference_id": "2075697", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075697" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27456" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pys7-779g-fqf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57012?format=api", "vulnerability_id": "VCID-qe1p-f4h5-uyga", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80331", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80442", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80358", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80347", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80386", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80405", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.8039", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80383", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80412", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80413", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80417", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756", "reference_id": "1890756", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/", "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/", "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2020-14812" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80154?format=api", "vulnerability_id": "VCID-qv7j-a4nn-97f7", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68093", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68028", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68042", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68066", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68052", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68017", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68067", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.6805", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992309", "reference_id": "1992309", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992309" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/", "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/" }, { "reference_url": "https://security.archlinux.org/AVG-2226", "reference_id": "AVG-2226", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-2/", "reference_id": "USN-5022-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-2/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/", "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-880/", "reference_id": "ZDI-21-880", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-880/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930454?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.12-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.12-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-2389" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7j-a4nn-97f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61753?format=api", "vulnerability_id": "VCID-r9tj-2m3h-a7fh", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32089.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32089.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32089", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33209", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33241", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33073", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3315", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33152", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33113", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3309", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33131", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33108", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33069", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3292", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32089" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106035", "reference_id": "2106035", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106035" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683", "reference_id": "RHSA-2023:5683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684", "reference_id": "RHSA-2023:5684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822", "reference_id": "RHSA-2023:6822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883", "reference_id": "RHSA-2023:6883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633", "reference_id": "RHSA-2023:7633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7633" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32089" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r9tj-2m3h-a7fh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57133?format=api", "vulnerability_id": "VCID-rf1r-a5xx-akb3", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.64986", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65036", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65116", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65064", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65025", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65107", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65096", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65068", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65105", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65114", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65098", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389", "reference_id": "1922389", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930452?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.5-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.5-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-2022" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61733?format=api", "vulnerability_id": "VCID-rrzq-esfe-c3ep", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27448.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27448.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27448", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38623", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38647", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.3851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38561", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.3857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38581", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38542", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38516", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38564", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38463", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38303", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075694", "reference_id": "2075694", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075694" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27448" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rrzq-esfe-c3ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61723?format=api", "vulnerability_id": "VCID-sayh-7e6g-uqda", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46912", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46859", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46913", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46936", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46909", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46916", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46972", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46968", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46902", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074996", "reference_id": "2074996", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074996" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27383" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sayh-7e6g-uqda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61727?format=api", "vulnerability_id": "VCID-sj1k-49rz-gyg9", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27444.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27444.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27444", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34617", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34643", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34512", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34554", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34583", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34546", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34521", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.3456", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34545", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34507", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34132", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27444" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075696", "reference_id": "2075696", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075696" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27444" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sj1k-49rz-gyg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61714?format=api", "vulnerability_id": "VCID-smhx-5fa3-4yay", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24051.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24051.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24051", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17645", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17737", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17759", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17821", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17837", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17746", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1769", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20659", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20601", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24051" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068233", "reference_id": "2068233", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068233" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-24051" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-smhx-5fa3-4yay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61722?format=api", "vulnerability_id": "VCID-t3bu-199s-pfez", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27382.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27382.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44469", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44404", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44455", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44462", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44448", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44503", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44495", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44344", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074987", "reference_id": "2074987", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074987" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27382" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t3bu-199s-pfez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61717?format=api", "vulnerability_id": "VCID-t7g8-dt3a-yba8", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27377.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27377.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27377", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55423", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55477", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55487", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55466", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55449", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55488", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55467", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55389", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074947", "reference_id": "2074947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074947" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27377" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7g8-dt3a-yba8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61749?format=api", "vulnerability_id": "VCID-tk47-7pwj-fkh5", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32084.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32084.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32084", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54906", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54875", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54925", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54936", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54918", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54933", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54916", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5489", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106034", "reference_id": "2106034", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106034" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5259", "reference_id": "RHSA-2023:5259", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5259" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683", "reference_id": "RHSA-2023:5683", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5683" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684", "reference_id": "RHSA-2023:5684", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5684" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822", "reference_id": "RHSA-2023:6822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883", "reference_id": "RHSA-2023:6883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633", "reference_id": "RHSA-2023:7633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7633" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32084" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tk47-7pwj-fkh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61730?format=api", "vulnerability_id": "VCID-tzj1-mvp6-wqga", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27445.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27445.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27445", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54283", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54313", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54288", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.5434", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54335", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54384", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54345", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54389", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00312", "scoring_system": "epss", "scoring_elements": "0.54332", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27445" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075691", "reference_id": "2075691", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075691" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27445" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tzj1-mvp6-wqga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61703?format=api", "vulnerability_id": "VCID-uhvt-x3cq-5kdw", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46661.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12594", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.127", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12631", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12651", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12565", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12471", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12477", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12599", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050017", "reference_id": "2050017", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050017" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46661" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uhvt-x3cq-5kdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61711?format=api", "vulnerability_id": "VCID-uubt-qpt1-sua8", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46669.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46669.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46669", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64587", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.6464", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64669", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64626", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64675", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.6469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64703", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64715", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64701", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64722", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050034", "reference_id": "2050034", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050034" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46669" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uubt-qpt1-sua8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61705?format=api", "vulnerability_id": "VCID-w69n-gw41-kkdv", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46663.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12594", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.127", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12631", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12651", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12565", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12471", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12477", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12599", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050022", "reference_id": "2050022", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050022" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5305-1/", "reference_id": "USN-5305-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5305-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46663" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w69n-gw41-kkdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59727?format=api", "vulnerability_id": "VCID-wht6-gdyu-bbhy", "summary": "Multiple vulnerabilities have been found in MariaDB, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27928.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27928.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27928", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.97742", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.97748", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.9775", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.97752", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.97757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.9776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.97763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.97765", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.97767", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.97773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.48947", "scoring_system": "epss", "scoring_elements": "0.97775", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940909", "reference_id": "1940909", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940909" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/49765.txt", "reference_id": "CVE-2021-27928", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/49765.txt" }, { "reference_url": "https://security.gentoo.org/glsa/202105-28", "reference_id": "GLSA-202105-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202105-28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1039", "reference_id": "RHSA-2021:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1240", "reference_id": "RHSA-2021:1240", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1240" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1241", "reference_id": "RHSA-2021:1241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1242", "reference_id": "RHSA-2021:1242", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1242" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2040", "reference_id": "RHSA-2021:2040", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2040" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930455?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.9-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.9-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-27928" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wht6-gdyu-bbhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57164?format=api", "vulnerability_id": "VCID-wvxn-ugew-u7bj", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78469", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78578", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78475", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78489", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78516", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78522", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78547", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78529", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78521", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78549", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78548", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78545", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755", "reference_id": "1951755", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428", "reference_id": "988428", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://security.archlinux.org/ASA-202105-14", "reference_id": "ASA-202105-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-14" }, { "reference_url": "https://security.archlinux.org/AVG-1882", "reference_id": "AVG-1882", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1882" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/", "reference_id": "DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/", "reference_id": "GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.gentoo.org/glsa/202105-28", "reference_id": "GLSA-202105-28", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://security.gentoo.org/glsa/202105-28" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/", "reference_id": "PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930453?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.10-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.10-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-2166" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61709?format=api", "vulnerability_id": "VCID-wyvr-ducu-ukfq", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11553", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11507", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11594", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11653", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11664", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11463", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11465", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11543", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050030", "reference_id": "2050030", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050030" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46667" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wyvr-ducu-ukfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61748?format=api", "vulnerability_id": "VCID-xnyt-rg5b-rket", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32083.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32083.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32083", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48094", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48115", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48065", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48118", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48113", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48136", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.4811", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48121", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48174", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48169", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48123", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48103", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32083" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32083" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104425", "reference_id": "2104425", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104425" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32083" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xnyt-rg5b-rket" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61750?format=api", "vulnerability_id": "VCID-xty8-u5vt-nkgf", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32085.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32085.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32085", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43217", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43235", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43247", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43269", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43221", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.4327", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43206", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43141", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32085" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32085", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32085" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104431", "reference_id": "2104431", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104431" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-32085" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xty8-u5vt-nkgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61731?format=api", "vulnerability_id": "VCID-xz4d-en3t-d7hp", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27446.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27446.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27446", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40518", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.4044", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.4049", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40502", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40522", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40485", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40465", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40513", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40482", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40406", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40296", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27446" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075692", "reference_id": "2075692", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075692" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27446" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xz4d-en3t-d7hp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61704?format=api", "vulnerability_id": "VCID-y9qz-gnth-87dt", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20169", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20317", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20099", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2018", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20239", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20262", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20217", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20158", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20151", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20154", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20153", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20034", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050019", "reference_id": "2050019", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050019" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46662" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y9qz-gnth-87dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61732?format=api", "vulnerability_id": "VCID-ywqs-mczx-ufh2", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27447.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27447.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27447", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46912", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46859", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46913", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46936", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46909", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46916", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46972", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46968", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46902", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27447" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075693", "reference_id": "2075693", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075693" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27447" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ywqs-mczx-ufh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61725?format=api", "vulnerability_id": "VCID-z7ed-2j49-kfh5", "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36395", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49705", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49733", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49684", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49739", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49751", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49723", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49724", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49771", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00263", "scoring_system": "epss", "scoring_elements": "0.49744", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27385" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075001", "reference_id": "2075001", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075001" }, { "reference_url": "https://security.gentoo.org/glsa/202405-25", "reference_id": "GLSA-202405-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930459?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.13-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.13-0%252Bdeb11u1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2022-27385" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7ed-2j49-kfh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80309?format=api", "vulnerability_id": "VCID-zzhd-1eyg-muge", "summary": "mariadb: save_window_function_values triggers an abort during IN subquery", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46658.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24327", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2421", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24253", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24269", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24226", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24185", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24172", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24149", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24025", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049294", "reference_id": "2049294", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/930457?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.11-1%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api", "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2021-46658" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zzhd-1eyg-muge" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye" }