Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
Typedeb
Namespacedebian
Namemysql-8.0
Version8.0.23-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.0.28-1
Latest_non_vulnerable_version8.0.46-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-29k9-yssc-jbec
vulnerability_id VCID-29k9-yssc-jbec
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2036
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.4214
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2036
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922395
reference_id 1922395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922395
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2036
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29k9-yssc-jbec
1
url VCID-2fyj-vfka-g3fc
vulnerability_id VCID-2fyj-vfka-g3fc
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2046
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-24T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
12
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2046
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922398
reference_id 1922398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922398
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2046
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fyj-vfka-g3fc
2
url VCID-2hqz-t746-57bt
vulnerability_id VCID-2hqz-t746-57bt
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2060
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42642
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42712
published_at 2026-04-02T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42625
published_at 2026-04-24T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42745
published_at 2026-04-09T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42766
published_at 2026-04-11T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-13T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42776
published_at 2026-04-16T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42764
published_at 2026-04-18T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42702
published_at 2026-04-21T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4268
published_at 2026-04-07T12:55:00Z
11
value 0.00206
scoring_system epss
scoring_elements 0.42731
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2060
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922402
reference_id 1922402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922402
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2060
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hqz-t746-57bt
3
url VCID-3v1d-x9yt-3fbb
vulnerability_id VCID-3v1d-x9yt-3fbb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2032
reference_id
reference_type
scores
0
value 0.00255
scoring_system epss
scoring_elements 0.48776
published_at 2026-04-01T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48815
published_at 2026-04-02T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.48838
published_at 2026-04-24T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48862
published_at 2026-04-11T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.48836
published_at 2026-04-12T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.48844
published_at 2026-04-13T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48894
published_at 2026-04-16T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.4889
published_at 2026-04-18T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.4885
published_at 2026-04-21T12:55:00Z
9
value 0.00255
scoring_system epss
scoring_elements 0.4884
published_at 2026-04-04T12:55:00Z
10
value 0.00255
scoring_system epss
scoring_elements 0.48795
published_at 2026-04-07T12:55:00Z
11
value 0.00255
scoring_system epss
scoring_elements 0.48849
published_at 2026-04-08T12:55:00Z
12
value 0.00255
scoring_system epss
scoring_elements 0.48846
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2032
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922394
reference_id 1922394
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922394
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2032
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3v1d-x9yt-3fbb
4
url VCID-4fdf-ne4n-wyc2
vulnerability_id VCID-4fdf-ne4n-wyc2
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2048
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54405
published_at 2026-04-01T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54481
published_at 2026-04-02T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.5451
published_at 2026-04-21T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54519
published_at 2026-04-09T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54531
published_at 2026-04-11T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54513
published_at 2026-04-12T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54492
published_at 2026-04-13T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.5453
published_at 2026-04-16T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54532
published_at 2026-04-18T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54503
published_at 2026-04-04T12:55:00Z
10
value 0.00314
scoring_system epss
scoring_elements 0.54472
published_at 2026-04-24T12:55:00Z
11
value 0.00314
scoring_system epss
scoring_elements 0.54525
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2048
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922399
reference_id 1922399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922399
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2048
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4fdf-ne4n-wyc2
5
url VCID-4zfz-7zkz-e7hn
vulnerability_id VCID-4zfz-7zkz-e7hn
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2002
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34706
published_at 2026-04-01T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34914
published_at 2026-04-02T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34578
published_at 2026-04-24T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.3494
published_at 2026-04-04T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.3482
published_at 2026-04-07T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34864
published_at 2026-04-08T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34892
published_at 2026-04-09T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34896
published_at 2026-04-11T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34859
published_at 2026-04-18T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34836
published_at 2026-04-13T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34875
published_at 2026-04-16T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34814
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2002
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922380
reference_id 1922380
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922380
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
10
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2002
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zfz-7zkz-e7hn
6
url VCID-8h4m-83xa-m7df
vulnerability_id VCID-8h4m-83xa-m7df
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2021
reference_id
reference_type
scores
0
value 0.51799
scoring_system epss
scoring_elements 0.97882
published_at 2026-04-01T12:55:00Z
1
value 0.51799
scoring_system epss
scoring_elements 0.97887
published_at 2026-04-02T12:55:00Z
2
value 0.51799
scoring_system epss
scoring_elements 0.97909
published_at 2026-04-24T12:55:00Z
3
value 0.51799
scoring_system epss
scoring_elements 0.97888
published_at 2026-04-04T12:55:00Z
4
value 0.51799
scoring_system epss
scoring_elements 0.97891
published_at 2026-04-07T12:55:00Z
5
value 0.51799
scoring_system epss
scoring_elements 0.97895
published_at 2026-04-08T12:55:00Z
6
value 0.51799
scoring_system epss
scoring_elements 0.97898
published_at 2026-04-09T12:55:00Z
7
value 0.51799
scoring_system epss
scoring_elements 0.97901
published_at 2026-04-11T12:55:00Z
8
value 0.51799
scoring_system epss
scoring_elements 0.97902
published_at 2026-04-12T12:55:00Z
9
value 0.51799
scoring_system epss
scoring_elements 0.97903
published_at 2026-04-13T12:55:00Z
10
value 0.51799
scoring_system epss
scoring_elements 0.97911
published_at 2026-04-18T12:55:00Z
11
value 0.51799
scoring_system epss
scoring_elements 0.9791
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2021
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922388
reference_id 1922388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922388
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
10
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2021
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4m-83xa-m7df
7
url VCID-ch22-5f87-tfhw
vulnerability_id VCID-ch22-5f87-tfhw
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2061
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.4214
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2061
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922403
reference_id 1922403
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922403
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2061
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ch22-5f87-tfhw
8
url VCID-d5js-9kvw-dyf9
vulnerability_id VCID-d5js-9kvw-dyf9
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2122
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.4214
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2122
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922411
reference_id 1922411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922411
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2122
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d5js-9kvw-dyf9
9
url VCID-dsp1-f2v8-z7fb
vulnerability_id VCID-dsp1-f2v8-z7fb
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2038
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.4214
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2038
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922396
reference_id 1922396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922396
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2038
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dsp1-f2v8-z7fb
10
url VCID-eh72-pgfd-x3dy
vulnerability_id VCID-eh72-pgfd-x3dy
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2070
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.4214
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2070
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922405
reference_id 1922405
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922405
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2070
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eh72-pgfd-x3dy
11
url VCID-g58r-8vcn-bfea
vulnerability_id VCID-g58r-8vcn-bfea
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2087
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25744
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25815
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25566
published_at 2026-04-24T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25757
published_at 2026-04-11T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25717
published_at 2026-04-12T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25659
published_at 2026-04-13T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25661
published_at 2026-04-16T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25644
published_at 2026-04-18T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25615
published_at 2026-04-21T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25858
published_at 2026-04-04T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25627
published_at 2026-04-07T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.257
published_at 2026-04-08T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25747
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2087
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922408
reference_id 1922408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922408
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2087
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g58r-8vcn-bfea
12
url VCID-getz-u39m-ubgv
vulnerability_id VCID-getz-u39m-ubgv
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1998
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.51073
published_at 2026-04-01T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51126
published_at 2026-04-02T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51137
published_at 2026-04-24T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.5115
published_at 2026-04-04T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51107
published_at 2026-04-07T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51163
published_at 2026-04-08T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51159
published_at 2026-04-09T12:55:00Z
7
value 0.00277
scoring_system epss
scoring_elements 0.51204
published_at 2026-04-11T12:55:00Z
8
value 0.00277
scoring_system epss
scoring_elements 0.51182
published_at 2026-04-12T12:55:00Z
9
value 0.00277
scoring_system epss
scoring_elements 0.51168
published_at 2026-04-13T12:55:00Z
10
value 0.00277
scoring_system epss
scoring_elements 0.51207
published_at 2026-04-16T12:55:00Z
11
value 0.00277
scoring_system epss
scoring_elements 0.51213
published_at 2026-04-18T12:55:00Z
12
value 0.00277
scoring_system epss
scoring_elements 0.51192
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1998
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922378
reference_id 1922378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922378
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
7
reference_url https://access.redhat.com/errata/RHSA-2020:3518
reference_id RHSA-2020:3518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3518
8
reference_url https://access.redhat.com/errata/RHSA-2020:3732
reference_id RHSA-2020:3732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3732
9
reference_url https://access.redhat.com/errata/RHSA-2020:3755
reference_id RHSA-2020:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3755
10
reference_url https://access.redhat.com/errata/RHSA-2020:3757
reference_id RHSA-2020:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3757
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-1998
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-getz-u39m-ubgv
13
url VCID-kwfb-kbpq-pkck
vulnerability_id VCID-kwfb-kbpq-pkck
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2031
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-24T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
12
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2031
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922393
reference_id 1922393
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922393
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2031
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfb-kbpq-pkck
14
url VCID-m2ey-feyg-ufb7
vulnerability_id VCID-m2ey-feyg-ufb7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2076
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-24T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
12
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2076
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922407
reference_id 1922407
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922407
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2076
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2ey-feyg-ufb7
15
url VCID-my1q-4m9d-9fgj
vulnerability_id VCID-my1q-4m9d-9fgj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2011
reference_id
reference_type
scores
0
value 0.02144
scoring_system epss
scoring_elements 0.84153
published_at 2026-04-01T12:55:00Z
1
value 0.02144
scoring_system epss
scoring_elements 0.84167
published_at 2026-04-02T12:55:00Z
2
value 0.02144
scoring_system epss
scoring_elements 0.84274
published_at 2026-04-24T12:55:00Z
3
value 0.02144
scoring_system epss
scoring_elements 0.84245
published_at 2026-04-18T12:55:00Z
4
value 0.02144
scoring_system epss
scoring_elements 0.84186
published_at 2026-04-07T12:55:00Z
5
value 0.02144
scoring_system epss
scoring_elements 0.84208
published_at 2026-04-08T12:55:00Z
6
value 0.02144
scoring_system epss
scoring_elements 0.84214
published_at 2026-04-09T12:55:00Z
7
value 0.02144
scoring_system epss
scoring_elements 0.84232
published_at 2026-04-11T12:55:00Z
8
value 0.02144
scoring_system epss
scoring_elements 0.84226
published_at 2026-04-12T12:55:00Z
9
value 0.02144
scoring_system epss
scoring_elements 0.84223
published_at 2026-04-13T12:55:00Z
10
value 0.02144
scoring_system epss
scoring_elements 0.84244
published_at 2026-04-16T12:55:00Z
11
value 0.02144
scoring_system epss
scoring_elements 0.8425
published_at 2026-04-21T12:55:00Z
12
value 0.02144
scoring_system epss
scoring_elements 0.84185
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2011
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922384
reference_id 1922384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922384
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210622-0001/
reference_id ntap-20210622-0001
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/
url https://security.netapp.com/advisory/ntap-20210622-0001/
7
reference_url https://access.redhat.com/errata/RHSA-2019:2327
reference_id RHSA-2019:2327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2327
8
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
9
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
11
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2011
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-my1q-4m9d-9fgj
16
url VCID-n9r2-crxf-jfh7
vulnerability_id VCID-n9r2-crxf-jfh7
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2088
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25744
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25815
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25566
published_at 2026-04-24T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25757
published_at 2026-04-11T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25717
published_at 2026-04-12T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25659
published_at 2026-04-13T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25661
published_at 2026-04-16T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25644
published_at 2026-04-18T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25615
published_at 2026-04-21T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25858
published_at 2026-04-04T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25627
published_at 2026-04-07T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.257
published_at 2026-04-08T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25747
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2088
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922410
reference_id 1922410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922410
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2088
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n9r2-crxf-jfh7
17
url VCID-p15d-cz1g-hucw
vulnerability_id VCID-p15d-cz1g-hucw
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2056
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.4214
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2056
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922419
reference_id 1922419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922419
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2056
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p15d-cz1g-hucw
18
url VCID-rf1r-a5xx-akb3
vulnerability_id VCID-rf1r-a5xx-akb3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2022
reference_id
reference_type
scores
0
value 0.0048
scoring_system epss
scoring_elements 0.64986
published_at 2026-04-01T12:55:00Z
1
value 0.0048
scoring_system epss
scoring_elements 0.65036
published_at 2026-04-02T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65116
published_at 2026-04-24T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65064
published_at 2026-04-04T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.65025
published_at 2026-04-07T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65075
published_at 2026-04-08T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65088
published_at 2026-04-09T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65107
published_at 2026-04-11T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65096
published_at 2026-04-12T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65068
published_at 2026-04-13T12:55:00Z
10
value 0.0048
scoring_system epss
scoring_elements 0.65105
published_at 2026-04-16T12:55:00Z
11
value 0.0048
scoring_system epss
scoring_elements 0.65114
published_at 2026-04-18T12:55:00Z
12
value 0.0048
scoring_system epss
scoring_elements 0.65098
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2022
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922389
reference_id 1922389
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922389
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
8
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
9
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
10
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
11
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
12
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
13
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
14
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
16
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2022
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3
19
url VCID-td7w-db1k-t3g3
vulnerability_id VCID-td7w-db1k-t3g3
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2072
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.56683
published_at 2026-04-01T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.56777
published_at 2026-04-02T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56736
published_at 2026-04-24T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-11T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.56816
published_at 2026-04-12T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56794
published_at 2026-04-13T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56825
published_at 2026-04-16T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56822
published_at 2026-04-18T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56797
published_at 2026-04-21T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56798
published_at 2026-04-04T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56774
published_at 2026-04-07T12:55:00Z
11
value 0.0034
scoring_system epss
scoring_elements 0.56826
published_at 2026-04-08T12:55:00Z
12
value 0.0034
scoring_system epss
scoring_elements 0.5683
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2072
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922406
reference_id 1922406
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922406
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2072
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-td7w-db1k-t3g3
20
url VCID-teu1-w449-fkcx
vulnerability_id VCID-teu1-w449-fkcx
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2065
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.4214
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2065
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922404
reference_id 1922404
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922404
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2065
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-teu1-w449-fkcx
21
url VCID-tudj-guxj-53ea
vulnerability_id VCID-tudj-guxj-53ea
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2024
reference_id
reference_type
scores
0
value 0.00637
scoring_system epss
scoring_elements 0.7041
published_at 2026-04-01T12:55:00Z
1
value 0.00637
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-02T12:55:00Z
2
value 0.00637
scoring_system epss
scoring_elements 0.70555
published_at 2026-04-24T12:55:00Z
3
value 0.00637
scoring_system epss
scoring_elements 0.70504
published_at 2026-04-11T12:55:00Z
4
value 0.00637
scoring_system epss
scoring_elements 0.70489
published_at 2026-04-12T12:55:00Z
5
value 0.00637
scoring_system epss
scoring_elements 0.70475
published_at 2026-04-13T12:55:00Z
6
value 0.00637
scoring_system epss
scoring_elements 0.70517
published_at 2026-04-16T12:55:00Z
7
value 0.00637
scoring_system epss
scoring_elements 0.70525
published_at 2026-04-18T12:55:00Z
8
value 0.00637
scoring_system epss
scoring_elements 0.70505
published_at 2026-04-21T12:55:00Z
9
value 0.00637
scoring_system epss
scoring_elements 0.70441
published_at 2026-04-04T12:55:00Z
10
value 0.00637
scoring_system epss
scoring_elements 0.70419
published_at 2026-04-07T12:55:00Z
11
value 0.00637
scoring_system epss
scoring_elements 0.70465
published_at 2026-04-08T12:55:00Z
12
value 0.00637
scoring_system epss
scoring_elements 0.7048
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2024
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922390
reference_id 1922390
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922390
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2024
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tudj-guxj-53ea
22
url VCID-uzvh-tvvx-vyer
vulnerability_id VCID-uzvh-tvvx-vyer
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2081
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.4214
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2081
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922416
reference_id 1922416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922416
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2081
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzvh-tvvx-vyer
23
url VCID-w93s-7t77-x3fg
vulnerability_id VCID-w93s-7t77-x3fg
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2010
reference_id
reference_type
scores
0
value 0.00364
scoring_system epss
scoring_elements 0.58354
published_at 2026-04-01T12:55:00Z
1
value 0.00364
scoring_system epss
scoring_elements 0.58439
published_at 2026-04-02T12:55:00Z
2
value 0.00364
scoring_system epss
scoring_elements 0.5845
published_at 2026-04-24T12:55:00Z
3
value 0.00364
scoring_system epss
scoring_elements 0.58458
published_at 2026-04-04T12:55:00Z
4
value 0.00364
scoring_system epss
scoring_elements 0.58432
published_at 2026-04-07T12:55:00Z
5
value 0.00364
scoring_system epss
scoring_elements 0.58485
published_at 2026-04-08T12:55:00Z
6
value 0.00364
scoring_system epss
scoring_elements 0.58491
published_at 2026-04-09T12:55:00Z
7
value 0.00364
scoring_system epss
scoring_elements 0.58508
published_at 2026-04-11T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.58488
published_at 2026-04-12T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58469
published_at 2026-04-13T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-16T12:55:00Z
11
value 0.00364
scoring_system epss
scoring_elements 0.58505
published_at 2026-04-18T12:55:00Z
12
value 0.00364
scoring_system epss
scoring_elements 0.58483
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2010
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922383
reference_id 1922383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922383
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
reference_id CS5THZSGI7O2CZO44NWYE57AG2T7NK3K
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/
5
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/
url https://security.gentoo.org/glsa/202105-27
6
reference_url https://security.netapp.com/advisory/ntap-20210622-0001/
reference_id ntap-20210622-0001
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/
url https://security.netapp.com/advisory/ntap-20210622-0001/
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
reference_id T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/
10
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2010
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w93s-7t77-x3fg
24
url VCID-z7zv-zgw7-n3fj
vulnerability_id VCID-z7zv-zgw7-n3fj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2058
reference_id
reference_type
scores
0
value 0.00201
scoring_system epss
scoring_elements 0.42189
published_at 2026-04-01T12:55:00Z
1
value 0.00201
scoring_system epss
scoring_elements 0.42247
published_at 2026-04-02T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.4214
published_at 2026-04-24T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42299
published_at 2026-04-11T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42262
published_at 2026-04-12T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42285
published_at 2026-04-16T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.4226
published_at 2026-04-18T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42192
published_at 2026-04-21T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-09T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42218
published_at 2026-04-07T12:55:00Z
11
value 0.00201
scoring_system epss
scoring_elements 0.42268
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2058
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922401
reference_id 1922401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922401
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
reference_id 980795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795
4
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/
url https://security.gentoo.org/glsa/202105-27
5
reference_url https://security.netapp.com/advisory/ntap-20210219-0003/
reference_id ntap-20210219-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/
url https://security.netapp.com/advisory/ntap-20210219-0003/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://usn.ubuntu.com/4716-1/
reference_id USN-4716-1
reference_type
scores
url https://usn.ubuntu.com/4716-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2058
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7zv-zgw7-n3fj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid