Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/931408?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "type": "deb", "namespace": "debian", "name": "mysql-8.0", "version": "8.0.23-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.0.28-1", "latest_non_vulnerable_version": "8.0.46-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57140?format=api", "vulnerability_id": "VCID-29k9-yssc-jbec", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2036", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922395", "reference_id": "1922395", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922395" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2036" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-29k9-yssc-jbec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57145?format=api", "vulnerability_id": "VCID-2fyj-vfka-g3fc", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2046", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922398", "reference_id": "1922398", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922398" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2046" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2fyj-vfka-g3fc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57151?format=api", "vulnerability_id": "VCID-2hqz-t746-57bt", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2060", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42745", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42731", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2060" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922402", "reference_id": "1922402", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922402" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2060" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2hqz-t746-57bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57139?format=api", "vulnerability_id": "VCID-3v1d-x9yt-3fbb", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2032", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48776", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48815", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48847", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48836", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48844", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.4889", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.4885", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48838", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.4884", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48849", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48862", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2032" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922394", "reference_id": "1922394", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922394" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2032" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3v1d-x9yt-3fbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57146?format=api", "vulnerability_id": "VCID-4fdf-ne4n-wyc2", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2048", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54405", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54481", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54488", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54531", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54513", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54492", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.5453", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54532", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.5451", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54503", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54472", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54525", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54519", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2048" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922399", "reference_id": "1922399", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922399" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2048" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4fdf-ne4n-wyc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57119?format=api", "vulnerability_id": "VCID-4zfz-7zkz-e7hn", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34706", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34558", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3482", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34864", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34896", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34859", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34836", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34875", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34814", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34578", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2002" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922380", "reference_id": "1922380", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922380" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2002" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zfz-7zkz-e7hn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57132?format=api", "vulnerability_id": "VCID-8h4m-83xa-m7df", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2021", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97882", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97887", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97909", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97888", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97891", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97895", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97898", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97901", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97902", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97903", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.9791", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922388", "reference_id": "1922388", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922388" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2021" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4m-83xa-m7df" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57153?format=api", "vulnerability_id": "VCID-ch22-5f87-tfhw", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2061", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2061" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922403", "reference_id": "1922403", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922403" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2061" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ch22-5f87-tfhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57162?format=api", "vulnerability_id": "VCID-d5js-9kvw-dyf9", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2122" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922411", "reference_id": "1922411", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922411" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2122" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5js-9kvw-dyf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57141?format=api", "vulnerability_id": "VCID-dsp1-f2v8-z7fb", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2038", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2038" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922396", "reference_id": "1922396", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922396" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2038" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dsp1-f2v8-z7fb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57156?format=api", "vulnerability_id": "VCID-eh72-pgfd-x3dy", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2070", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2070" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922405", "reference_id": "1922405", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922405" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2070" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eh72-pgfd-x3dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57160?format=api", "vulnerability_id": "VCID-g58r-8vcn-bfea", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2087", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25744", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25815", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25558", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25659", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25661", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25644", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25615", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25566", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25858", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.257", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25757", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2087" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922408", "reference_id": "1922408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922408" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2087" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g58r-8vcn-bfea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57117?format=api", "vulnerability_id": "VCID-getz-u39m-ubgv", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-1998", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51073", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51145", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51107", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51163", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51159", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51204", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51182", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51168", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51207", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51213", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51137", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.5115", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-1998" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922378", "reference_id": "1922378", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922378" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518", "reference_id": "RHSA-2020:3518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732", "reference_id": "RHSA-2020:3732", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3732" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755", "reference_id": "RHSA-2020:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757", "reference_id": "RHSA-2020:3757", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3757" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-1998" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-getz-u39m-ubgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57138?format=api", "vulnerability_id": "VCID-kwfb-kbpq-pkck", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2031", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2031" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922393", "reference_id": "1922393", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922393" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2031" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfb-kbpq-pkck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57158?format=api", "vulnerability_id": "VCID-m2ey-feyg-ufb7", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2076", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2076" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922407", "reference_id": "1922407", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922407" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2076" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2ey-feyg-ufb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57125?format=api", "vulnerability_id": "VCID-my1q-4m9d-9fgj", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2011", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84153", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84167", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84284", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.8425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84226", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84244", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84245", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84274", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84186", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2011" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922384", "reference_id": "1922384", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922384" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/", "reference_id": "ntap-20210622-0001", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210622-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2327", "reference_id": "RHSA-2019:2327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2011" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-my1q-4m9d-9fgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57161?format=api", "vulnerability_id": "VCID-n9r2-crxf-jfh7", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25744", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25815", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25558", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25659", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25661", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25644", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25615", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25566", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25858", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.257", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25757", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2088" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922410", "reference_id": "1922410", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922410" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2088" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n9r2-crxf-jfh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57148?format=api", "vulnerability_id": "VCID-p15d-cz1g-hucw", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2056", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922419", "reference_id": "1922419", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922419" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2056" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p15d-cz1g-hucw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57133?format=api", "vulnerability_id": "VCID-rf1r-a5xx-akb3", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.64986", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65036", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65129", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65025", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65107", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65096", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65068", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65105", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65114", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65098", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65116", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65064", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389", "reference_id": "1922389", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2022" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57157?format=api", "vulnerability_id": "VCID-td7w-db1k-t3g3", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2072", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2072" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922406", "reference_id": "1922406", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922406" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2072" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-td7w-db1k-t3g3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57154?format=api", "vulnerability_id": "VCID-teu1-w449-fkcx", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2065", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2065" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922404", "reference_id": "1922404", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922404" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2065" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teu1-w449-fkcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57134?format=api", "vulnerability_id": "VCID-tudj-guxj-53ea", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2024", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7041", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70424", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70564", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70489", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70517", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70525", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70505", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70555", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70441", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70419", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70465", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70504", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2024" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922390", "reference_id": "1922390", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922390" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2024" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tudj-guxj-53ea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57159?format=api", "vulnerability_id": "VCID-uzvh-tvvx-vyer", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2081", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2081" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922416", "reference_id": "1922416", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922416" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2081" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzvh-tvvx-vyer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57124?format=api", "vulnerability_id": "VCID-w93s-7t77-x3fg", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2010", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58354", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58463", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58485", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58508", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58488", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58469", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58501", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58505", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58483", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.5845", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58458", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2010" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922383", "reference_id": "1922383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922383" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/", "reference_id": "ntap-20210622-0001", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210622-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2010" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w93s-7t77-x3fg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57150?format=api", "vulnerability_id": "VCID-z7zv-zgw7-n3fj", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2058", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2058" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922401", "reference_id": "1922401", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922401" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931408?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2058" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7zv-zgw7-n3fj" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid" }