Lookup for vulnerable packages by Package URL.

GET /api/packages/931408?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "mysql-8.0",
    "version": "8.0.23-1",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "8.0.28-1",
    "latest_non_vulnerable_version": "8.0.46-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57140?format=api",
            "vulnerability_id": "VCID-29k9-yssc-jbec",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2036"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922395",
                    "reference_id": "1922395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922395"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2036"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-29k9-yssc-jbec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57145?format=api",
            "vulnerability_id": "VCID-2fyj-vfka-g3fc",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56754",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56736",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2046"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922398",
                    "reference_id": "1922398",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922398"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2046"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2fyj-vfka-g3fc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57151?format=api",
            "vulnerability_id": "VCID-2hqz-t746-57bt",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2060",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2060"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922402",
                    "reference_id": "1922402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922402"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2060"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2hqz-t746-57bt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57139?format=api",
            "vulnerability_id": "VCID-3v1d-x9yt-3fbb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48776",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48815",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48847",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48836",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48844",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48894",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4889",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4885",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48838",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4884",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48795",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48849",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48846",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48862",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2032"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922394",
                    "reference_id": "1922394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922394"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2032"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3v1d-x9yt-3fbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57146?format=api",
            "vulnerability_id": "VCID-4fdf-ne4n-wyc2",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54405",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54481",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54488",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54531",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54513",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54492",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5453",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54532",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5451",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54503",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54472",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54525",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54519",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2048"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922399",
                    "reference_id": "1922399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922399"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2048"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4fdf-ne4n-wyc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57119?format=api",
            "vulnerability_id": "VCID-4zfz-7zkz-e7hn",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34706",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34914",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34558",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3494",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3482",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34864",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34892",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34896",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34859",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34836",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34875",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34814",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34578",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2002"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922380",
                    "reference_id": "1922380",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922380"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2002"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zfz-7zkz-e7hn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57132?format=api",
            "vulnerability_id": "VCID-8h4m-83xa-m7df",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97882",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97887",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97909",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97888",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97891",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97895",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97898",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97901",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97902",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97903",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97911",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.51799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9791",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2021"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922388",
                    "reference_id": "1922388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922388"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2021"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4m-83xa-m7df"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57153?format=api",
            "vulnerability_id": "VCID-ch22-5f87-tfhw",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2061",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2061"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922403",
                    "reference_id": "1922403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922403"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2061"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ch22-5f87-tfhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57162?format=api",
            "vulnerability_id": "VCID-d5js-9kvw-dyf9",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2122"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922411",
                    "reference_id": "1922411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922411"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2122"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5js-9kvw-dyf9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57141?format=api",
            "vulnerability_id": "VCID-dsp1-f2v8-z7fb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2038"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922396",
                    "reference_id": "1922396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922396"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2038"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dsp1-f2v8-z7fb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57156?format=api",
            "vulnerability_id": "VCID-eh72-pgfd-x3dy",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2070"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922405",
                    "reference_id": "1922405",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922405"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2070"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eh72-pgfd-x3dy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57160?format=api",
            "vulnerability_id": "VCID-g58r-8vcn-bfea",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25815",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25558",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25717",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25661",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25644",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25615",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25566",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25858",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25627",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.257",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25747",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25757",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2087"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922408",
                    "reference_id": "1922408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922408"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2087"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g58r-8vcn-bfea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57117?format=api",
            "vulnerability_id": "VCID-getz-u39m-ubgv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-1998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51073",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51126",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51145",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51107",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51163",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51159",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51204",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51182",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51168",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51207",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51213",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51137",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5115",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-1998"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922378",
                    "reference_id": "1922378",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922378"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-1998"
            ],
            "risk_score": 1.7,
            "exploitability": "0.5",
            "weighted_severity": "3.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-getz-u39m-ubgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57138?format=api",
            "vulnerability_id": "VCID-kwfb-kbpq-pkck",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56754",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56736",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2031"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922393",
                    "reference_id": "1922393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922393"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2031"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfb-kbpq-pkck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57158?format=api",
            "vulnerability_id": "VCID-m2ey-feyg-ufb7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56754",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56736",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2076"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922407",
                    "reference_id": "1922407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922407"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2076"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2ey-feyg-ufb7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57125?format=api",
            "vulnerability_id": "VCID-my1q-4m9d-9fgj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84153",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84167",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84284",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8425",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84208",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84214",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84232",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84226",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84223",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84244",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84245",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84274",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84185",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84186",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2011"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922384",
                    "reference_id": "1922384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922384"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/",
                    "reference_id": "ntap-20210622-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210622-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2327",
                    "reference_id": "RHSA-2019:2327",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2011"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-my1q-4m9d-9fgj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57161?format=api",
            "vulnerability_id": "VCID-n9r2-crxf-jfh7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2088",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25815",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25558",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25717",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25661",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25644",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25615",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25566",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25858",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25627",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.257",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25747",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25757",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2088"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922410",
                    "reference_id": "1922410",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922410"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2088"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n9r2-crxf-jfh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57148?format=api",
            "vulnerability_id": "VCID-p15d-cz1g-hucw",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2056"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922419",
                    "reference_id": "1922419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922419"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2056"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p15d-cz1g-hucw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57133?format=api",
            "vulnerability_id": "VCID-rf1r-a5xx-akb3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64986",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65036",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65129",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65025",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65075",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65088",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65107",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65096",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65068",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65105",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65114",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65098",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65116",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65064",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389",
                    "reference_id": "1922389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2022"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57157?format=api",
            "vulnerability_id": "VCID-td7w-db1k-t3g3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56754",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56736",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2072"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922406",
                    "reference_id": "1922406",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922406"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2072"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-td7w-db1k-t3g3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57154?format=api",
            "vulnerability_id": "VCID-teu1-w449-fkcx",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2065"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922404",
                    "reference_id": "1922404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922404"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2065"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teu1-w449-fkcx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57134?format=api",
            "vulnerability_id": "VCID-tudj-guxj-53ea",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7041",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70424",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70564",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70489",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70475",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70517",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70525",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70505",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70555",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70441",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70419",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70465",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7048",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70504",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2024"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922390",
                    "reference_id": "1922390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922390"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2024"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tudj-guxj-53ea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57159?format=api",
            "vulnerability_id": "VCID-uzvh-tvvx-vyer",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2081"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922416",
                    "reference_id": "1922416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922416"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2081"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzvh-tvvx-vyer"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57124?format=api",
            "vulnerability_id": "VCID-w93s-7t77-x3fg",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58354",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58439",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58463",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58432",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58485",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58508",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58488",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58469",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58501",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58505",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58483",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5845",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58458",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2010"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922383",
                    "reference_id": "1922383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922383"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
                    "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/",
                    "reference_id": "ntap-20210622-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210622-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
                    "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2010"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w93s-7t77-x3fg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57150?format=api",
            "vulnerability_id": "VCID-z7zv-zgw7-n3fj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2058"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922401",
                    "reference_id": "1922401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922401"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795",
                    "reference_id": "980795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4716-1/",
                    "reference_id": "USN-4716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4716-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2058"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7zv-zgw7-n3fj"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"
}