Lookup for vulnerable packages by Package URL.

GET /api/packages/930448?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
    "type": "deb",
    "namespace": "debian",
    "name": "mariadb-10.5",
    "version": "1:10.5.23-0+deb11u1",
    "qualifiers": {
        "distro": "bullseye"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1:10.5.26-0+deb11u1",
    "latest_non_vulnerable_version": "1:10.5.29-0+deb11u1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61743?format=api",
            "vulnerability_id": "VCID-27zh-jckv-xkgy",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31622.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31622.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10076",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10136",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10034",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1011",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10171",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1021",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10151",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10024",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10001",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10131",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10106",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092354",
                    "reference_id": "2092354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092354"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-31622"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-27zh-jckv-xkgy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80469?format=api",
            "vulnerability_id": "VCID-2n1a-mq7k-r3fj",
            "summary": "mariadb: assertion failures in decimal_bin_size",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27387.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27387.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47844",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47865",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47814",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47866",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47862",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47886",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47863",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47873",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47927",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47921",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47874",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00246",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47857",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27387"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075006",
                    "reference_id": "2075006",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075006"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27387"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2n1a-mq7k-r3fj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61713?format=api",
            "vulnerability_id": "VCID-33z5-5vrs-7ud3",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24050.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24050.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21394",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21571",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21541",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21591",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21662",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21624",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21566",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21564",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24235",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24199",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24050"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069833",
                    "reference_id": "2069833",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069833"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24050"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-33z5-5vrs-7ud3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79962?format=api",
            "vulnerability_id": "VCID-36fa-z98h-3yfk",
            "summary": "mysql: InnoDB unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42962",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43022",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43049",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42986",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43036",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43037",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4308",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43004",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101",
                    "reference_id": "2016101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/",
                    "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-2/",
                    "reference_id": "USN-5123-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5170-1/",
                    "reference_id": "USN-5170-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5170-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/",
                    "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-35604"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70816?format=api",
            "vulnerability_id": "VCID-3tgc-def7-zufy",
            "summary": "mariadb: MariaDB Server Crash",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52971",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15739",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15595",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1568",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19477",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19524",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19375",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19326",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19269",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21263",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22777",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24571",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30031",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52971"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437",
                    "reference_id": "1100437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350917",
                    "reference_id": "2350917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350917"
                },
                {
                    "reference_url": "https://jira.mariadb.org/browse/MDEV-32084",
                    "reference_id": "MDEV-32084",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:07Z/"
                        }
                    ],
                    "url": "https://jira.mariadb.org/browse/MDEV-32084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136",
                    "reference_id": "RHSA-2026:0136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247",
                    "reference_id": "RHSA-2026:0247",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0247"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334",
                    "reference_id": "RHSA-2026:0334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0334"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335",
                    "reference_id": "RHSA-2026:0335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376",
                    "reference_id": "RHSA-2026:0376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0376"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435",
                    "reference_id": "RHSA-2026:6435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6435"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7548-1/",
                    "reference_id": "USN-7548-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7548-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930451?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@0?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@0%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2023-52971"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3tgc-def7-zufy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61738?format=api",
            "vulnerability_id": "VCID-43t8-end1-9fb5",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27455.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27455.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33075",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33107",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32937",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32982",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33012",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33015",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32952",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32994",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32973",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32936",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32788",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075701",
                    "reference_id": "2075701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075701"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27455"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43t8-end1-9fb5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70815?format=api",
            "vulnerability_id": "VCID-45ah-27q3-tbbh",
            "summary": "mariadb: MariaDB Server Crash Due to Empty Backtrace Log",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52969",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40578",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40517",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40568",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43348",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43376",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47707",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47684",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47693",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56569",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56504",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60574",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52969"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437",
                    "reference_id": "1100437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350916",
                    "reference_id": "2350916",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350916"
                },
                {
                    "reference_url": "https://jira.mariadb.org/browse/MDEV-32083",
                    "reference_id": "MDEV-32083",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T15:57:59Z/"
                        }
                    ],
                    "url": "https://jira.mariadb.org/browse/MDEV-32083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572",
                    "reference_id": "RHSA-2025:19572",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19572"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584",
                    "reference_id": "RHSA-2025:19584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19584"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136",
                    "reference_id": "RHSA-2026:0136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247",
                    "reference_id": "RHSA-2026:0247",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0247"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334",
                    "reference_id": "RHSA-2026:0334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0334"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335",
                    "reference_id": "RHSA-2026:0335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376",
                    "reference_id": "RHSA-2026:0376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0376"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435",
                    "reference_id": "RHSA-2026:6435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6435"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7519-1/",
                    "reference_id": "USN-7519-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7519-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7548-1/",
                    "reference_id": "USN-7548-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7548-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930462?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.28-0%252Bdeb11u2%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2023-52969"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45ah-27q3-tbbh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80311?format=api",
            "vulnerability_id": "VCID-4buk-e1hz-67gv",
            "summary": "mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46657.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46657.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20903",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21053",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21107",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20823",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20902",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20963",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2098",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20936",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20882",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20873",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20874",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20854",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20727",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049305",
                    "reference_id": "2049305",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049305"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930457?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.11-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46657"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4buk-e1hz-67gv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57003?format=api",
            "vulnerability_id": "VCID-4msq-13an-d7cb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76546",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7666",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76574",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76598",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76604",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76636",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7664",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76628",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747",
                    "reference_id": "1890747",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-14789"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61746?format=api",
            "vulnerability_id": "VCID-5142-jmqx-zffm",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32081.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32081.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33209",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33241",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33116",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33152",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33113",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3309",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33131",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33108",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33069",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3292",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106028",
                    "reference_id": "2106028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106028"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683",
                    "reference_id": "RHSA-2023:5683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684",
                    "reference_id": "RHSA-2023:5684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5684"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822",
                    "reference_id": "RHSA-2023:6822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883",
                    "reference_id": "RHSA-2023:6883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633",
                    "reference_id": "RHSA-2023:7633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7633"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32081"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5142-jmqx-zffm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61710?format=api",
            "vulnerability_id": "VCID-525u-kpee-auhh",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46668.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46668.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10528",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10673",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10737",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10594",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10667",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10723",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10706",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10681",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10541",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10557",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10686",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10637",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46668"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050032",
                    "reference_id": "2050032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050032"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46668"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-525u-kpee-auhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80310?format=api",
            "vulnerability_id": "VCID-5hbe-vqqs-sbav",
            "summary": "mariadb: Crash executing query with VIEW, aggregate and subquery",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46659.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46659.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46659",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11709",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11831",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11873",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11659",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11744",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11797",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11808",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1177",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11745",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11608",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11607",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1173",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1169",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46659"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049302",
                    "reference_id": "2049302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46659"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5hbe-vqqs-sbav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56999?format=api",
            "vulnerability_id": "VCID-5sgr-q6mn-u7gq",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76546",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7666",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76574",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76598",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76604",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76636",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7664",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76628",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743",
                    "reference_id": "1890743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-14776"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78013?format=api",
            "vulnerability_id": "VCID-6atg-7j6k-dkhp",
            "summary": "mysql: InnoDB unspecified vulnerability (CPU Oct 2023)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8013",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8015",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80138",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80167",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80174",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80193",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80178",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80169",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80198",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.802",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80229",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034",
                    "reference_id": "1055034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245023",
                    "reference_id": "2245023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245023"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0739",
                    "reference_id": "RHSA-2025:0739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0739"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0914",
                    "reference_id": "RHSA-2025:0914",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0914"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6459-1/",
                    "reference_id": "USN-6459-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6459-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6583-1/",
                    "reference_id": "USN-6583-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6583-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6600-1/",
                    "reference_id": "USN-6600-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6600-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2023-22084"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6atg-7j6k-dkhp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61737?format=api",
            "vulnerability_id": "VCID-6uu4-2sn3-1fex",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27452.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27452.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27452",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33877",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33909",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33763",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33806",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3384",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33837",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33795",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33808",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33794",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33761",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33394",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27452"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076145",
                    "reference_id": "2076145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076145"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27452"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6uu4-2sn3-1fex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61719?format=api",
            "vulnerability_id": "VCID-71sp-67qb-g7c1",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27379.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27379.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27379",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4427",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58289",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58309",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58284",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58337",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58343",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58361",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58338",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58318",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58351",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58354",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58331",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27379"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074951",
                    "reference_id": "2074951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074951"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27379"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-71sp-67qb-g7c1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61720?format=api",
            "vulnerability_id": "VCID-75zq-85c3-jfc5",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27380.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27380.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52892",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65588",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65617",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65584",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65636",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65648",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65669",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65654",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65661",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65674",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65656",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27380"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074966",
                    "reference_id": "2074966",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074966"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27380"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75zq-85c3-jfc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70817?format=api",
            "vulnerability_id": "VCID-7awt-vh1g-3fdj",
            "summary": "mariadb: MariaDB Server Crash via Item_direct_view_ref",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40578",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40517",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40568",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43348",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43376",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47707",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47684",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47693",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48738",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56569",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56504",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52970"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437",
                    "reference_id": "1100437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350918",
                    "reference_id": "2350918",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350918"
                },
                {
                    "reference_url": "https://jira.mariadb.org/browse/MDEV-32086",
                    "reference_id": "MDEV-32086",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:41Z/"
                        }
                    ],
                    "url": "https://jira.mariadb.org/browse/MDEV-32086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572",
                    "reference_id": "RHSA-2025:19572",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19572"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584",
                    "reference_id": "RHSA-2025:19584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19584"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136",
                    "reference_id": "RHSA-2026:0136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247",
                    "reference_id": "RHSA-2026:0247",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0247"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334",
                    "reference_id": "RHSA-2026:0334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0334"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335",
                    "reference_id": "RHSA-2026:0335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376",
                    "reference_id": "RHSA-2026:0376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0376"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435",
                    "reference_id": "RHSA-2026:6435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6435"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7519-1/",
                    "reference_id": "USN-7519-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7519-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7548-1/",
                    "reference_id": "USN-7548-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7548-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930462?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.28-0%252Bdeb11u2%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2023-52970"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7awt-vh1g-3fdj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61708?format=api",
            "vulnerability_id": "VCID-844r-9np7-k7c8",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46666.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46666.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19564",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19705",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19754",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19479",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19558",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1961",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19614",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19566",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19508",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19474",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19482",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19494",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19385",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050028",
                    "reference_id": "2050028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050028"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930457?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.11-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46666"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-844r-9np7-k7c8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70374?format=api",
            "vulnerability_id": "VCID-9c35-pmbb-efe9",
            "summary": "mysql: mariadb: InnoDB unspecified vulnerability (CPU Apr 2025)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51467",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51415",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51469",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58627",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58584",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58605",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58573",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58563",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58628",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58609",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58589",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00366",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58622",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30693"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385",
                    "reference_id": "1103385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976",
                    "reference_id": "1105976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359963",
                    "reference_id": "2359963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359963"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
                    "reference_id": "cpuapr2025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:23:08Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15699",
                    "reference_id": "RHSA-2025:15699",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15699"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16046",
                    "reference_id": "RHSA-2025:16046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16086",
                    "reference_id": "RHSA-2025:16086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16861",
                    "reference_id": "RHSA-2025:16861",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16861"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572",
                    "reference_id": "RHSA-2025:19572",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19572"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584",
                    "reference_id": "RHSA-2025:19584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19584"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136",
                    "reference_id": "RHSA-2026:0136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247",
                    "reference_id": "RHSA-2026:0247",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0247"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334",
                    "reference_id": "RHSA-2026:0334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0334"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335",
                    "reference_id": "RHSA-2026:0335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376",
                    "reference_id": "RHSA-2026:0376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0376"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435",
                    "reference_id": "RHSA-2026:6435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6435"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7479-1/",
                    "reference_id": "USN-7479-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7479-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7519-1/",
                    "reference_id": "USN-7519-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7519-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7548-1/",
                    "reference_id": "USN-7548-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7548-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930465?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.29-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.29-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2025-30693"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9c35-pmbb-efe9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80783?format=api",
            "vulnerability_id": "VCID-9cj5-1s7j-2bhz",
            "summary": "mariadb: Named pipe permission issue on Windows",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28912.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28912.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30102",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3014",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30187",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3006",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30096",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30101",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30057",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30008",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30023",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30003",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29959",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29886",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28912"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899332",
                    "reference_id": "1899332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899332"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930451?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@0?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@0%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-28912"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9cj5-1s7j-2bhz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80394?format=api",
            "vulnerability_id": "VCID-9dt5-yek1-wfg9",
            "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78612",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78619",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78715",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78649",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7863",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78656",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78663",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78688",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78669",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78661",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7869",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78687",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78684",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951764",
                    "reference_id": "1951764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951764"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-2194"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9dt5-yek1-wfg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61715?format=api",
            "vulnerability_id": "VCID-9ef6-tbwp-pbct",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24052.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24052.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1988",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19995",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1999",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19955",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20035",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20094",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20112",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20067",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19991",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2275",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22706",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24052"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068211",
                    "reference_id": "2068211",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068211"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24052"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ef6-tbwp-pbct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70364?format=api",
            "vulnerability_id": "VCID-a732-u6ue-57h5",
            "summary": "mysql: mariadb: mysqldump unspecified vulnerability (CPU Apr 2025)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56629",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56586",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56693",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56668",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56647",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56678",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56677",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56649",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57084",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57134",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57136",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385",
                    "reference_id": "1103385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976",
                    "reference_id": "1105976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359885",
                    "reference_id": "2359885",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359885"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
                    "reference_id": "cpuapr2025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-17T13:37:19Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15699",
                    "reference_id": "RHSA-2025:15699",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15699"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16046",
                    "reference_id": "RHSA-2025:16046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16086",
                    "reference_id": "RHSA-2025:16086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16861",
                    "reference_id": "RHSA-2025:16861",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16861"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572",
                    "reference_id": "RHSA-2025:19572",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19572"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584",
                    "reference_id": "RHSA-2025:19584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19584"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136",
                    "reference_id": "RHSA-2026:0136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0136"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247",
                    "reference_id": "RHSA-2026:0247",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0247"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334",
                    "reference_id": "RHSA-2026:0334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0334"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335",
                    "reference_id": "RHSA-2026:0335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376",
                    "reference_id": "RHSA-2026:0376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0376"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435",
                    "reference_id": "RHSA-2026:6435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6435"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7479-1/",
                    "reference_id": "USN-7479-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7479-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7519-1/",
                    "reference_id": "USN-7519-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7519-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7548-1/",
                    "reference_id": "USN-7548-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7548-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930465?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.29-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.29-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2025-30722"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a732-u6ue-57h5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61712?format=api",
            "vulnerability_id": "VCID-b3mn-83vb-jbdw",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24048.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24048.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1988",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19995",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1999",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19955",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20035",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20094",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20112",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20067",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19991",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2275",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22706",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24048"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068234",
                    "reference_id": "2068234",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068234"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24048"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3mn-83vb-jbdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61752?format=api",
            "vulnerability_id": "VCID-b95t-t1d4-kfda",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32088.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32088.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32088",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50624",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50651",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5066",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50656",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50699",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50676",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50661",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50702",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50708",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50687",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50635",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32088"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32088",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32088"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106008",
                    "reference_id": "2106008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106008"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32088"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b95t-t1d4-kfda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61747?format=api",
            "vulnerability_id": "VCID-bufd-a3f4-7ucf",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32082.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32082.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32082",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39104",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39126",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39101",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39117",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39129",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39092",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39072",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39128",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39097",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39009",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38802",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32082"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106030",
                    "reference_id": "2106030",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106030"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683",
                    "reference_id": "RHSA-2023:5683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684",
                    "reference_id": "RHSA-2023:5684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5684"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822",
                    "reference_id": "RHSA-2023:6822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883",
                    "reference_id": "RHSA-2023:6883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633",
                    "reference_id": "RHSA-2023:7633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7633"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32082"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bufd-a3f4-7ucf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61756?format=api",
            "vulnerability_id": "VCID-c45y-pbjr-73ez",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47015.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47015.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44719",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44615",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44677",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4473",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44732",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44749",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44717",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44718",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44773",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44765",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44695",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47015"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034889",
                    "reference_id": "1034889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034889"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163609",
                    "reference_id": "2163609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163609"
                },
                {
                    "reference_url": "https://github.com/MariaDB/server/commit/be0a46b3d52b58956fd0d47d040b9f4514406954",
                    "reference_id": "be0a46b3d52b58956fd0d47d040b9f4514406954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"
                        }
                    ],
                    "url": "https://github.com/MariaDB/server/commit/be0a46b3d52b58956fd0d47d040b9f4514406954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00005.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230309-0009/",
                    "reference_id": "ntap-20230309-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230309-0009/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/",
                    "reference_id": "O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5259",
                    "reference_id": "RHSA-2023:5259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5259"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683",
                    "reference_id": "RHSA-2023:5683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684",
                    "reference_id": "RHSA-2023:5684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5684"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822",
                    "reference_id": "RHSA-2023:6822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883",
                    "reference_id": "RHSA-2023:6883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633",
                    "reference_id": "RHSA-2023:7633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7633"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU/",
                    "reference_id": "SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6600-1/",
                    "reference_id": "USN-6600-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6600-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930460?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.20-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.20-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-47015"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c45y-pbjr-73ez"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61724?format=api",
            "vulnerability_id": "VCID-c4ag-ndpx-kbcv",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27384.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27384.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27384",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4427",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58289",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58309",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58284",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58337",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58343",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58361",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58338",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58318",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58351",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58354",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58331",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27384"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074999",
                    "reference_id": "2074999",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074999"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27384"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4ag-ndpx-kbcv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61755?format=api",
            "vulnerability_id": "VCID-cnw5-r38y-4uc5",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38791.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38791.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10363",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1043",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10314",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10387",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1045",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1048",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10414",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10284",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10255",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10369",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38791"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38791"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130105",
                    "reference_id": "2130105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130105"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5259",
                    "reference_id": "RHSA-2023:5259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5259"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683",
                    "reference_id": "RHSA-2023:5683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684",
                    "reference_id": "RHSA-2023:5684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5684"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822",
                    "reference_id": "RHSA-2023:6822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883",
                    "reference_id": "RHSA-2023:6883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633",
                    "reference_id": "RHSA-2023:7633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7633"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-38791"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cnw5-r38y-4uc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61751?format=api",
            "vulnerability_id": "VCID-d4g3-12ak-aybw",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32086.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32086.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30063",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3011",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29923",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29985",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30019",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30025",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2998",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29931",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29947",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29927",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29879",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29803",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32086"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32086"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104433",
                    "reference_id": "2104433",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104433"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32086"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d4g3-12ak-aybw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76869?format=api",
            "vulnerability_id": "VCID-dxbv-e8pq-p7ew",
            "summary": "mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21096.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21096.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31301",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31121",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31174",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31205",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3121",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31167",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31123",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31156",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31136",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31104",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31452",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21096"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189",
                    "reference_id": "1069189",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275452",
                    "reference_id": "2275452",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275452"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/",
                    "reference_id": "CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
                    "reference_id": "cpuapr2024.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2024.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/",
                    "reference_id": "KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
                    "reference_id": "ntap-20240426-0013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240426-0013/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0737",
                    "reference_id": "RHSA-2025:0737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0737"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0739",
                    "reference_id": "RHSA-2025:0739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0739"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0912",
                    "reference_id": "RHSA-2025:0912",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0912"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0914",
                    "reference_id": "RHSA-2025:0914",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0914"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335",
                    "reference_id": "RHSA-2026:0335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0335"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6823-1/",
                    "reference_id": "USN-6823-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6823-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6839-1/",
                    "reference_id": "USN-6839-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6839-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930463?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.26-0%2Bdeb11u2?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.26-0%252Bdeb11u2%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2024-21096"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dxbv-e8pq-p7ew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57163?format=api",
            "vulnerability_id": "VCID-eakf-rhk4-m3g8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22592",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22613",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22765",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22662",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22666",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2265",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22707",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22746",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22726",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22675",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22809",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.226",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24756",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2154"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951752",
                    "reference_id": "1951752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951752"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428",
                    "reference_id": "988428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-14",
                    "reference_id": "ASA-202105-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1882",
                    "reference_id": "AVG-1882",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1882"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/",
                    "reference_id": "DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/",
                    "reference_id": "GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-28",
                    "reference_id": "GLSA-202105-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-28"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/",
                    "reference_id": "PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930453?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.10-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.10-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-2154"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eakf-rhk4-m3g8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61721?format=api",
            "vulnerability_id": "VCID-edcd-rsx7-ykb4",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27381.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27381.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4427",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58289",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58309",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58284",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58337",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58343",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58361",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58338",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58318",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58351",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58354",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58331",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074981",
                    "reference_id": "2074981",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074981"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27381"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edcd-rsx7-ykb4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79499?format=api",
            "vulnerability_id": "VCID-ezwh-q7de-abey",
            "summary": "mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22213",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21906",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22179",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22199",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22159",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22099",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22093",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22046",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22261",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22044",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22124",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21427"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082644",
                    "reference_id": "2082644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082644"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/",
                    "reference_id": "ntap-20220429-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220429-0005/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590",
                    "reference_id": "RHSA-2022:6590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5400-1/",
                    "reference_id": "USN-5400-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5400-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5400-2/",
                    "reference_id": "USN-5400-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5400-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-21427"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwh-q7de-abey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61745?format=api",
            "vulnerability_id": "VCID-g2x8-3226-jufz",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13585",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13646",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13445",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13526",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13576",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13548",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1351",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13463",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13376",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13374",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13449",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092362",
                    "reference_id": "2092362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092362"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-31624"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g2x8-3226-jufz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80076?format=api",
            "vulnerability_id": "VCID-gqcf-pren-h3cm",
            "summary": "mariadb: server crash in Item_args::walk_args",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32087.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32087.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76334",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76364",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76344",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76377",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7639",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76416",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76394",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76389",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76429",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76435",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76419",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76453",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32087"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104434",
                    "reference_id": "2104434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104434"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32087"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqcf-pren-h3cm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61754?format=api",
            "vulnerability_id": "VCID-gqcv-pefj-43au",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32091.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32091.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5488",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54906",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54875",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54925",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54923",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54936",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54918",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54895",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54933",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54916",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5489",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32091"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106042",
                    "reference_id": "2106042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106042"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5259",
                    "reference_id": "RHSA-2023:5259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5259"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683",
                    "reference_id": "RHSA-2023:5683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684",
                    "reference_id": "RHSA-2023:5684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5684"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822",
                    "reference_id": "RHSA-2023:6822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883",
                    "reference_id": "RHSA-2023:6883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633",
                    "reference_id": "RHSA-2023:7633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7633"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32091"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqcv-pefj-43au"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80148?format=api",
            "vulnerability_id": "VCID-j734-hefa-1yaa",
            "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49828",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49888",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49865",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49893",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49844",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49898",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49892",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4991",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49882",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49883",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49928",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49929",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49901",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2372"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992303",
                    "reference_id": "1992303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992303"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/",
                    "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/",
                    "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2226",
                    "reference_id": "AVG-2226",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2226"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/",
                    "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-1/",
                    "reference_id": "USN-5022-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-2/",
                    "reference_id": "USN-5022-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/",
                    "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930454?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.12-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.12-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-2372"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j734-hefa-1yaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70814?format=api",
            "vulnerability_id": "VCID-jed2-gwqr-zbed",
            "summary": "mariadb: Crash in MariaDB Due to Improper Handling of Derived Tables",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52968.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52968.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05343",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05153",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05305",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06339",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27692",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27483",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27551",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27594",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27598",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27554",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27497",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27654",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52968"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350915",
                    "reference_id": "2350915",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350915"
                },
                {
                    "reference_url": "https://jira.mariadb.org/browse/MDEV-32082",
                    "reference_id": "MDEV-32082",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T15:58:35Z/"
                        }
                    ],
                    "url": "https://jira.mariadb.org/browse/MDEV-32082"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930461?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.26-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.26-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2023-52968"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jed2-gwqr-zbed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71988?format=api",
            "vulnerability_id": "VCID-jpqr-hknn-6fd9",
            "summary": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21490.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21490.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-21490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53099",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53082",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57407",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57478",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57474",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57453",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60225",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6024",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60175",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60941",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63593",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63619",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-21490"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877",
                    "reference_id": "1093877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221",
                    "reference_id": "2339221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2025.html",
                    "reference_id": "cpujan2025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T19:32:41Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2025.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1671",
                    "reference_id": "RHSA-2025:1671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1673",
                    "reference_id": "RHSA-2025:1673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1673"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572",
                    "reference_id": "RHSA-2025:19572",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19572"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584",
                    "reference_id": "RHSA-2025:19584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19584"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247",
                    "reference_id": "RHSA-2026:0247",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0247"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334",
                    "reference_id": "RHSA-2026:0334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0334"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335",
                    "reference_id": "RHSA-2026:0335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435",
                    "reference_id": "RHSA-2026:6435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:6435"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7245-1/",
                    "reference_id": "USN-7245-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7245-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7376-1/",
                    "reference_id": "USN-7376-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7376-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7376-2/",
                    "reference_id": "USN-7376-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7376-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930464?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.28-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.28-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2025-21490"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jpqr-hknn-6fd9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41457?format=api",
            "vulnerability_id": "VCID-k6rd-6zrp-ffbm",
            "summary": "A vulnerability has been discovered in MariaDB which could result\n    in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15180.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15180.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89202",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89222",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89225",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89243",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89248",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89257",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89253",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8925",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89263",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89258",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89276",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15180"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894919",
                    "reference_id": "1894919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894919"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202011-14",
                    "reference_id": "GLSA-202011-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202011-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5379",
                    "reference_id": "RHSA-2020:5379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5379"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4603-1/",
                    "reference_id": "USN-4603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930450?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.6-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.6-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-15180"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6rd-6zrp-ffbm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61718?format=api",
            "vulnerability_id": "VCID-kcxa-pm2w-5qd9",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27378.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27378.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4427",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58289",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58309",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58284",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58337",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58343",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58361",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58338",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58318",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58351",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58354",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58331",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27378"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074949",
                    "reference_id": "2074949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074949"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27378"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kcxa-pm2w-5qd9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61736?format=api",
            "vulnerability_id": "VCID-kw4q-mtgs-j3gs",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27451.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27451.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33075",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33107",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32937",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32982",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33012",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33015",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32952",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32994",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32973",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32936",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32788",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27451"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076144",
                    "reference_id": "2076144",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076144"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27451"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kw4q-mtgs-j3gs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61740?format=api",
            "vulnerability_id": "VCID-m6nu-xhk5-7kf4",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27457.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27457.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33075",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33107",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32937",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32982",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33012",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33015",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32952",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32994",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32973",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32936",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32788",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27457"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075699",
                    "reference_id": "2075699",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075699"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27457"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m6nu-xhk5-7kf4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61707?format=api",
            "vulnerability_id": "VCID-mpbk-tjrm-pufu",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46665.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46665.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46665",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12594",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.127",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12745",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12631",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12651",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1261",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12565",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12477",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12591",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12599",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46665"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050026",
                    "reference_id": "2050026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050026"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46665"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mpbk-tjrm-pufu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61716?format=api",
            "vulnerability_id": "VCID-mz73-138k-v7h5",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27376.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27376.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55423",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55447",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55426",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55477",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55487",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55466",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55449",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55485",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55488",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55467",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55389",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074817",
                    "reference_id": "2074817",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074817"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27376"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mz73-138k-v7h5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61735?format=api",
            "vulnerability_id": "VCID-nfc7-vsbw-yugg",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27449.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27449.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47709",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4773",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4768",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47734",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47755",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47732",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47742",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47796",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4779",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47741",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47723",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27449"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075695",
                    "reference_id": "2075695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075695"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27449"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfc7-vsbw-yugg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61744?format=api",
            "vulnerability_id": "VCID-nw1y-ajx5-ebej",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09536",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09674",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09628",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09598",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09582",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09475",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09478",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09627",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09585",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09498",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09621",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/MariaDB/server/pull/1938",
                    "reference_id": "1938",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/"
                        }
                    ],
                    "url": "https://github.com/MariaDB/server/pull/1938"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092360",
                    "reference_id": "2092360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092360"
                },
                {
                    "reference_url": "https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94",
                    "reference_id": "7c30bc38a588b22b01f11130cfe99e7f36accf94",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/"
                        }
                    ],
                    "url": "https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://jira.mariadb.org/browse/MDEV-26561",
                    "reference_id": "MDEV-26561",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/"
                        }
                    ],
                    "url": "https://jira.mariadb.org/browse/MDEV-26561"
                },
                {
                    "reference_url": "https://jira.mariadb.org/browse/MDEV-26574",
                    "reference_id": "MDEV-26574",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/"
                        }
                    ],
                    "url": "https://jira.mariadb.org/browse/MDEV-26574"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220707-0006/",
                    "reference_id": "ntap-20220707-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-10T20:56:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220707-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-31623"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nw1y-ajx5-ebej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61726?format=api",
            "vulnerability_id": "VCID-p152-cnc6-5qcn",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27386.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27386.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43287",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57394",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5737",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57423",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57425",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57441",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57419",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.574",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57426",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57422",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57401",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27386"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075005",
                    "reference_id": "2075005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075005"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27386"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p152-cnc6-5qcn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61742?format=api",
            "vulnerability_id": "VCID-pk23-a5y3-4ub5",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09534",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09672",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09584",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09497",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09572",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09619",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09626",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09596",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09473",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09477",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09625",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092353",
                    "reference_id": "2092353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092353"
                },
                {
                    "reference_url": "https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
                    "reference_id": "b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/"
                        }
                    ],
                    "url": "https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://jira.mariadb.org/browse/MDEV-26561",
                    "reference_id": "MDEV-26561",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/"
                        }
                    ],
                    "url": "https://jira.mariadb.org/browse/MDEV-26561"
                },
                {
                    "reference_url": "https://jira.mariadb.org/browse/MDEV-26574",
                    "reference_id": "MDEV-26574",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/"
                        }
                    ],
                    "url": "https://jira.mariadb.org/browse/MDEV-26574"
                },
                {
                    "reference_url": "https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
                    "reference_id": "MDEV-26574?filter=-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/"
                        }
                    ],
                    "url": "https://jira.mariadb.org/browse/MDEV-26574?filter=-2"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220707-0006/",
                    "reference_id": "ntap-20220707-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220707-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-31621"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pk23-a5y3-4ub5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61706?format=api",
            "vulnerability_id": "VCID-pkew-29au-ukac",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46664.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46664.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12594",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.127",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12745",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12631",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12651",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1261",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12565",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12477",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12591",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12599",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050024",
                    "reference_id": "2050024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050024"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46664"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pkew-29au-ukac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56994?format=api",
            "vulnerability_id": "VCID-pmhc-1rhq-gfeb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82525",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82539",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8265",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82554",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8255",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82576",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82584",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82602",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82596",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82589",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82626",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82629",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738",
                    "reference_id": "1890738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-14765"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61739?format=api",
            "vulnerability_id": "VCID-pys7-779g-fqf6",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27456.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27456.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33877",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33909",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33763",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33806",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3384",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33837",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33795",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33808",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33794",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33761",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33394",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27456"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075697",
                    "reference_id": "2075697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075697"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27456"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pys7-779g-fqf6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57012?format=api",
            "vulnerability_id": "VCID-qe1p-f4h5-uyga",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80331",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80338",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80442",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80347",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80376",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80386",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80405",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8039",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80412",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80413",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80417",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756",
                    "reference_id": "1890756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930449?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.8-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.8-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-14812"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80154?format=api",
            "vulnerability_id": "VCID-qv7j-a4nn-97f7",
            "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67956",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68093",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67979",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67998",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68028",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68042",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68066",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68052",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68017",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68054",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68067",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6805",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992309",
                    "reference_id": "1992309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992309"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/",
                    "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2226",
                    "reference_id": "AVG-2226",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2226"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-1/",
                    "reference_id": "USN-5022-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-2/",
                    "reference_id": "USN-5022-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/",
                    "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-880/",
                    "reference_id": "ZDI-21-880",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-880/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930454?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.12-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.12-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-2389"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7j-a4nn-97f7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61753?format=api",
            "vulnerability_id": "VCID-r9tj-2m3h-a7fh",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32089.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32089.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33209",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33241",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33116",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33152",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33113",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3309",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33131",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33108",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33069",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3292",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106035",
                    "reference_id": "2106035",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106035"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683",
                    "reference_id": "RHSA-2023:5683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684",
                    "reference_id": "RHSA-2023:5684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5684"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822",
                    "reference_id": "RHSA-2023:6822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883",
                    "reference_id": "RHSA-2023:6883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633",
                    "reference_id": "RHSA-2023:7633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7633"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32089"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r9tj-2m3h-a7fh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57133?format=api",
            "vulnerability_id": "VCID-rf1r-a5xx-akb3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64986",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65036",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65116",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65064",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65025",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65075",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65088",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65107",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65096",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65068",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65105",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65114",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65098",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389",
                    "reference_id": "1922389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930452?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.5-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.5-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-2022"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61733?format=api",
            "vulnerability_id": "VCID-rrzq-esfe-c3ep",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27448.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27448.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38623",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38647",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3851",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38561",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38581",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38542",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38516",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38564",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38463",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38303",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075694",
                    "reference_id": "2075694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075694"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27448"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rrzq-esfe-c3ep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61723?format=api",
            "vulnerability_id": "VCID-sayh-7e6g-uqda",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27383.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27383.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46895",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46912",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46859",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46913",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46936",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46909",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46972",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46968",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46917",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46902",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27383"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074996",
                    "reference_id": "2074996",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074996"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27383"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sayh-7e6g-uqda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61727?format=api",
            "vulnerability_id": "VCID-sj1k-49rz-gyg9",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27444.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27444.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34617",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34643",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34512",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34554",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34583",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34585",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34546",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34521",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3456",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34545",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34507",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34132",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27444"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075696",
                    "reference_id": "2075696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075696"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27444"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sj1k-49rz-gyg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61714?format=api",
            "vulnerability_id": "VCID-smhx-5fa3-4yay",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24051.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24051.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17645",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17737",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1767",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17759",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17821",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17837",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17794",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17746",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1769",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20659",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20601",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24051"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068233",
                    "reference_id": "2068233",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068233"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24051"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-smhx-5fa3-4yay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61722?format=api",
            "vulnerability_id": "VCID-t3bu-199s-pfez",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27382.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27382.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44447",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44469",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44404",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44455",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44462",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44478",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44448",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44503",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44495",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44425",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44344",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27382"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074987",
                    "reference_id": "2074987",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074987"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27382"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t3bu-199s-pfez"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61717?format=api",
            "vulnerability_id": "VCID-t7g8-dt3a-yba8",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27377.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27377.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55423",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55447",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55426",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55477",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55487",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55466",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55449",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55485",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55488",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55467",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55389",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27377"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074947",
                    "reference_id": "2074947",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074947"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27377"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7g8-dt3a-yba8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61749?format=api",
            "vulnerability_id": "VCID-tk47-7pwj-fkh5",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32084.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32084.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5488",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54906",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54875",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54925",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54923",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54936",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54918",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54895",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54933",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54916",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5489",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32084"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106034",
                    "reference_id": "2106034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106034"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5259",
                    "reference_id": "RHSA-2023:5259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5259"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5683",
                    "reference_id": "RHSA-2023:5683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5684",
                    "reference_id": "RHSA-2023:5684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5684"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6822",
                    "reference_id": "RHSA-2023:6822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6883",
                    "reference_id": "RHSA-2023:6883",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6883"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7633",
                    "reference_id": "RHSA-2023:7633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7633"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32084"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tk47-7pwj-fkh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61730?format=api",
            "vulnerability_id": "VCID-tzj1-mvp6-wqga",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27445.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27445.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27445",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54283",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54313",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54288",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5434",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54384",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54366",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54345",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54389",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54369",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54332",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27445"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075691",
                    "reference_id": "2075691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075691"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27445"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tzj1-mvp6-wqga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61703?format=api",
            "vulnerability_id": "VCID-uhvt-x3cq-5kdw",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46661.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46661.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12594",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.127",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12745",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12631",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12651",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1261",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12565",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12477",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12591",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12599",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050017",
                    "reference_id": "2050017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050017"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46661"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uhvt-x3cq-5kdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61711?format=api",
            "vulnerability_id": "VCID-uubt-qpt1-sua8",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46669.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46669.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64587",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6464",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64669",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64626",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64675",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6469",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64707",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64696",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64667",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64703",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64715",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64701",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64722",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050034",
                    "reference_id": "2050034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050034"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46669"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uubt-qpt1-sua8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61705?format=api",
            "vulnerability_id": "VCID-w69n-gw41-kkdv",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46663.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46663.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12594",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.127",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12745",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12631",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12651",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1261",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12565",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12477",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12591",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12599",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050022",
                    "reference_id": "2050022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050022"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5305-1/",
                    "reference_id": "USN-5305-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5305-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46663"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w69n-gw41-kkdv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59727?format=api",
            "vulnerability_id": "VCID-wht6-gdyu-bbhy",
            "summary": "Multiple vulnerabilities have been found in MariaDB, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27928.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27928.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27928",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97742",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97748",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9775",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97752",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97757",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9776",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97763",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97765",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97767",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97773",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.48947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97775",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27928"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27928"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940909",
                    "reference_id": "1940909",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940909"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/49765.txt",
                    "reference_id": "CVE-2021-27928",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/49765.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-28",
                    "reference_id": "GLSA-202105-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-28"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1039",
                    "reference_id": "RHSA-2021:1039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1240",
                    "reference_id": "RHSA-2021:1240",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1240"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1241",
                    "reference_id": "RHSA-2021:1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1242",
                    "reference_id": "RHSA-2021:1242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2040",
                    "reference_id": "RHSA-2021:2040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2040"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930455?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.9-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.9-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-27928"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wht6-gdyu-bbhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57164?format=api",
            "vulnerability_id": "VCID-wvxn-ugew-u7bj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78469",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78578",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78475",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78506",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78489",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78516",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78522",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78547",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78529",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78521",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78549",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78548",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78545",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755",
                    "reference_id": "1951755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428",
                    "reference_id": "988428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-14",
                    "reference_id": "ASA-202105-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1882",
                    "reference_id": "AVG-1882",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1882"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/",
                    "reference_id": "DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/",
                    "reference_id": "GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-28",
                    "reference_id": "GLSA-202105-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-28"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/",
                    "reference_id": "PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930453?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.10-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.10-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-2166"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61709?format=api",
            "vulnerability_id": "VCID-wyvr-ducu-ukfq",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11553",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11679",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11722",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11594",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11653",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11664",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11627",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.116",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11463",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11465",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11591",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11543",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050030",
                    "reference_id": "2050030",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050030"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46667"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wyvr-ducu-ukfq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61748?format=api",
            "vulnerability_id": "VCID-xnyt-rg5b-rket",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32083.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32083.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48094",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48065",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48118",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48113",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4811",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48121",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48174",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48169",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48123",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48103",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32083"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32083"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104425",
                    "reference_id": "2104425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104425"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32083"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xnyt-rg5b-rket"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61750?format=api",
            "vulnerability_id": "VCID-xty8-u5vt-nkgf",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32085.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32085.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43217",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43245",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43183",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43235",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43247",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43269",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43237",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43221",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43282",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4327",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43206",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43141",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32085"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32085"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104431",
                    "reference_id": "2104431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104431"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-32085"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xty8-u5vt-nkgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61731?format=api",
            "vulnerability_id": "VCID-xz4d-en3t-d7hp",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27446.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27446.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40491",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40518",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4044",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4049",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40502",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40522",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40485",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40465",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40513",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40482",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40406",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40296",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27446"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075692",
                    "reference_id": "2075692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075692"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27446"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xz4d-en3t-d7hp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61704?format=api",
            "vulnerability_id": "VCID-y9qz-gnth-87dt",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20169",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20317",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20376",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20099",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2018",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20239",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20262",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20217",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20158",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20151",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20154",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20153",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20034",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46662"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050019",
                    "reference_id": "2050019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050019"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930456?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.15-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.15-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46662"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y9qz-gnth-87dt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61732?format=api",
            "vulnerability_id": "VCID-ywqs-mczx-ufh2",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27447.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27447.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46895",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46912",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46859",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46913",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46936",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46909",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46972",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46968",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46917",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46902",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27447"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075693",
                    "reference_id": "2075693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075693"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930458?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.18-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.18-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27447"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ywqs-mczx-ufh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61725?format=api",
            "vulnerability_id": "VCID-z7ed-2j49-kfh5",
            "summary": "Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36395",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49705",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49733",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49684",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49739",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49734",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49751",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49723",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49724",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49771",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49744",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27385"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075001",
                    "reference_id": "2075001",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075001"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-25",
                    "reference_id": "GLSA-202405-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930459?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.13-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.13-0%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-27385"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7ed-2j49-kfh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80309?format=api",
            "vulnerability_id": "VCID-zzhd-1eyg-muge",
            "summary": "mariadb: save_window_function_values triggers an abort during IN subquery",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46658.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46658.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24198",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24327",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2436",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24144",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2421",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24253",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24269",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24226",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24169",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24185",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24172",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24149",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24025",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049294",
                    "reference_id": "2049294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930457?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.11-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.11-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930448?format=api",
                    "purl": "pkg:deb/debian/mariadb-10.5@1:10.5.23-0%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-46658"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zzhd-1eyg-muge"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mariadb-10.5@1:10.5.23-0%252Bdeb11u1%3Fdistro=bullseye"
}