Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
Typedeb
Namespacedebian
Namemysql-8.0
Version8.0.28-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.0.29-1
Latest_non_vulnerable_version8.0.45-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-129c-q69g-nkbu
vulnerability_id VCID-129c-q69g-nkbu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35636
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35636
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016124
reference_id 2016124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016124
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:13Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35636
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-129c-q69g-nkbu
1
url VCID-1748-hmbg-hbhk
vulnerability_id VCID-1748-hmbg-hbhk
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35628
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35628
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016114
reference_id 2016114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016114
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:21Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35628
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1748-hmbg-hbhk
2
url VCID-1b6h-r8cr-7be7
vulnerability_id VCID-1b6h-r8cr-7be7
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2169
reference_id
reference_type
scores
0
value 0.01728
scoring_system epss
scoring_elements 0.82369
published_at 2026-04-01T12:55:00Z
1
value 0.01728
scoring_system epss
scoring_elements 0.82383
published_at 2026-04-02T12:55:00Z
2
value 0.01728
scoring_system epss
scoring_elements 0.82483
published_at 2026-04-21T12:55:00Z
3
value 0.01728
scoring_system epss
scoring_elements 0.824
published_at 2026-04-04T12:55:00Z
4
value 0.01728
scoring_system epss
scoring_elements 0.82397
published_at 2026-04-07T12:55:00Z
5
value 0.01728
scoring_system epss
scoring_elements 0.82425
published_at 2026-04-08T12:55:00Z
6
value 0.01728
scoring_system epss
scoring_elements 0.82432
published_at 2026-04-09T12:55:00Z
7
value 0.01728
scoring_system epss
scoring_elements 0.82451
published_at 2026-04-11T12:55:00Z
8
value 0.01728
scoring_system epss
scoring_elements 0.82447
published_at 2026-04-12T12:55:00Z
9
value 0.01728
scoring_system epss
scoring_elements 0.82442
published_at 2026-04-13T12:55:00Z
10
value 0.01728
scoring_system epss
scoring_elements 0.82477
published_at 2026-04-16T12:55:00Z
11
value 0.01728
scoring_system epss
scoring_elements 0.82479
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2169
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951756
reference_id 1951756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951756
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
9
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
10
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2169
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6h-r8cr-7be7
3
url VCID-1muw-xrgz-uub8
vulnerability_id VCID-1muw-xrgz-uub8
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2179
reference_id
reference_type
scores
0
value 0.01728
scoring_system epss
scoring_elements 0.82369
published_at 2026-04-01T12:55:00Z
1
value 0.01728
scoring_system epss
scoring_elements 0.82383
published_at 2026-04-02T12:55:00Z
2
value 0.01728
scoring_system epss
scoring_elements 0.82483
published_at 2026-04-21T12:55:00Z
3
value 0.01728
scoring_system epss
scoring_elements 0.824
published_at 2026-04-04T12:55:00Z
4
value 0.01728
scoring_system epss
scoring_elements 0.82397
published_at 2026-04-07T12:55:00Z
5
value 0.01728
scoring_system epss
scoring_elements 0.82425
published_at 2026-04-08T12:55:00Z
6
value 0.01728
scoring_system epss
scoring_elements 0.82432
published_at 2026-04-09T12:55:00Z
7
value 0.01728
scoring_system epss
scoring_elements 0.82451
published_at 2026-04-11T12:55:00Z
8
value 0.01728
scoring_system epss
scoring_elements 0.82447
published_at 2026-04-12T12:55:00Z
9
value 0.01728
scoring_system epss
scoring_elements 0.82442
published_at 2026-04-13T12:55:00Z
10
value 0.01728
scoring_system epss
scoring_elements 0.82477
published_at 2026-04-16T12:55:00Z
11
value 0.01728
scoring_system epss
scoring_elements 0.82479
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2179
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951761
reference_id 1951761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951761
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
9
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
10
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2179
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1muw-xrgz-uub8
4
url VCID-259b-q1uk-vyap
vulnerability_id VCID-259b-q1uk-vyap
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35646
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35646
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016135
reference_id 2016135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016135
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:03Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35646
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-259b-q1uk-vyap
5
url VCID-2uvf-vapz-8ud5
vulnerability_id VCID-2uvf-vapz-8ud5
summary mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2162.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2162
reference_id
reference_type
scores
0
value 0.00627
scoring_system epss
scoring_elements 0.70164
published_at 2026-04-01T12:55:00Z
1
value 0.00627
scoring_system epss
scoring_elements 0.70176
published_at 2026-04-02T12:55:00Z
2
value 0.00627
scoring_system epss
scoring_elements 0.70258
published_at 2026-04-21T12:55:00Z
3
value 0.00627
scoring_system epss
scoring_elements 0.7024
published_at 2026-04-12T12:55:00Z
4
value 0.00627
scoring_system epss
scoring_elements 0.70227
published_at 2026-04-13T12:55:00Z
5
value 0.00627
scoring_system epss
scoring_elements 0.70269
published_at 2026-04-16T12:55:00Z
6
value 0.00627
scoring_system epss
scoring_elements 0.70278
published_at 2026-04-18T12:55:00Z
7
value 0.00627
scoring_system epss
scoring_elements 0.70193
published_at 2026-04-04T12:55:00Z
8
value 0.00627
scoring_system epss
scoring_elements 0.7017
published_at 2026-04-07T12:55:00Z
9
value 0.00627
scoring_system epss
scoring_elements 0.70217
published_at 2026-04-08T12:55:00Z
10
value 0.00627
scoring_system epss
scoring_elements 0.70232
published_at 2026-04-09T12:55:00Z
11
value 0.00627
scoring_system epss
scoring_elements 0.70255
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2162
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951753
reference_id 1951753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951753
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
5
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2162
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uvf-vapz-8ud5
6
url VCID-34tb-1r12-kbe9
vulnerability_id VCID-34tb-1r12-kbe9
summary mysql: C API unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35597
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.71378
published_at 2026-04-01T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71386
published_at 2026-04-02T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71452
published_at 2026-04-21T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71404
published_at 2026-04-04T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71379
published_at 2026-04-07T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.7142
published_at 2026-04-08T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71432
published_at 2026-04-09T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71454
published_at 2026-04-11T12:55:00Z
8
value 0.00674
scoring_system epss
scoring_elements 0.71438
published_at 2026-04-12T12:55:00Z
9
value 0.00674
scoring_system epss
scoring_elements 0.71421
published_at 2026-04-13T12:55:00Z
10
value 0.00674
scoring_system epss
scoring_elements 0.71467
published_at 2026-04-16T12:55:00Z
11
value 0.00674
scoring_system epss
scoring_elements 0.71472
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35597
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016099
reference_id 2016099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016099
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0005/
reference_id ntap-20211022-0005
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/
url https://security.netapp.com/advisory/ntap-20211022-0005/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35597
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34tb-1r12-kbe9
7
url VCID-35tu-zc9b-j7dd
vulnerability_id VCID-35tu-zc9b-j7dd
summary mysql: Server: GIS unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35631
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35631
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016118
reference_id 2016118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016118
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:18Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35631
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35tu-zc9b-j7dd
8
url VCID-36fa-z98h-3yfk
vulnerability_id VCID-36fa-z98h-3yfk
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35604
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.42962
published_at 2026-04-01T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43022
published_at 2026-04-13T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43004
published_at 2026-04-21T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43049
published_at 2026-04-09T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.42986
published_at 2026-04-07T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43036
published_at 2026-04-08T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43071
published_at 2026-04-11T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43037
published_at 2026-04-12T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.4308
published_at 2026-04-16T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43068
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016101
reference_id 2016101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016101
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
7
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
9
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
10
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
11
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
12
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
13
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
14
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
15
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
17
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
18
reference_url https://usn.ubuntu.com/5123-2/
reference_id USN-5123-2
reference_type
scores
url https://usn.ubuntu.com/5123-2/
19
reference_url https://usn.ubuntu.com/5170-1/
reference_id USN-5170-1
reference_type
scores
url https://usn.ubuntu.com/5170-1/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35604
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk
9
url VCID-37kg-raqg-2ugz
vulnerability_id VCID-37kg-raqg-2ugz
summary Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: ndbcluster/plugin DDL). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35584
reference_id
reference_type
scores
0
value 0.00281
scoring_system epss
scoring_elements 0.51481
published_at 2026-04-21T12:55:00Z
1
value 0.00281
scoring_system epss
scoring_elements 0.51406
published_at 2026-04-02T12:55:00Z
2
value 0.00281
scoring_system epss
scoring_elements 0.51453
published_at 2026-04-13T12:55:00Z
3
value 0.00281
scoring_system epss
scoring_elements 0.51495
published_at 2026-04-16T12:55:00Z
4
value 0.00281
scoring_system epss
scoring_elements 0.51503
published_at 2026-04-18T12:55:00Z
5
value 0.00281
scoring_system epss
scoring_elements 0.51356
published_at 2026-04-01T12:55:00Z
6
value 0.00281
scoring_system epss
scoring_elements 0.51433
published_at 2026-04-04T12:55:00Z
7
value 0.00281
scoring_system epss
scoring_elements 0.51393
published_at 2026-04-07T12:55:00Z
8
value 0.00281
scoring_system epss
scoring_elements 0.51446
published_at 2026-04-08T12:55:00Z
9
value 0.00281
scoring_system epss
scoring_elements 0.51444
published_at 2026-04-09T12:55:00Z
10
value 0.00281
scoring_system epss
scoring_elements 0.51487
published_at 2026-04-11T12:55:00Z
11
value 0.00281
scoring_system epss
scoring_elements 0.51465
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35584
1
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:46Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
2
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35584
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-37kg-raqg-2ugz
10
url VCID-3h8k-bmwq-4uam
vulnerability_id VCID-3h8k-bmwq-4uam
summary Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35613
reference_id
reference_type
scores
0
value 0.0073
scoring_system epss
scoring_elements 0.72708
published_at 2026-04-21T12:55:00Z
1
value 0.0073
scoring_system epss
scoring_elements 0.72621
published_at 2026-04-02T12:55:00Z
2
value 0.0073
scoring_system epss
scoring_elements 0.72663
published_at 2026-04-13T12:55:00Z
3
value 0.0073
scoring_system epss
scoring_elements 0.72705
published_at 2026-04-16T12:55:00Z
4
value 0.0073
scoring_system epss
scoring_elements 0.72716
published_at 2026-04-18T12:55:00Z
5
value 0.0073
scoring_system epss
scoring_elements 0.72613
published_at 2026-04-01T12:55:00Z
6
value 0.0073
scoring_system epss
scoring_elements 0.72638
published_at 2026-04-04T12:55:00Z
7
value 0.0073
scoring_system epss
scoring_elements 0.72616
published_at 2026-04-07T12:55:00Z
8
value 0.0073
scoring_system epss
scoring_elements 0.72654
published_at 2026-04-08T12:55:00Z
9
value 0.0073
scoring_system epss
scoring_elements 0.72667
published_at 2026-04-09T12:55:00Z
10
value 0.0073
scoring_system epss
scoring_elements 0.7269
published_at 2026-04-11T12:55:00Z
11
value 0.0073
scoring_system epss
scoring_elements 0.72673
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35613
1
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:30Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
2
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35613
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3h8k-bmwq-4uam
11
url VCID-3kv6-pbgg-c3au
vulnerability_id VCID-3kv6-pbgg-c3au
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35635
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35635
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016122
reference_id 2016122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016122
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:14Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35635
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3kv6-pbgg-c3au
12
url VCID-3qju-u4f8-6ybw
vulnerability_id VCID-3qju-u4f8-6ybw
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35645
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35645
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016134
reference_id 2016134
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016134
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:04Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35645
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qju-u4f8-6ybw
13
url VCID-4c8x-j238-bbgz
vulnerability_id VCID-4c8x-j238-bbgz
summary mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2201
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76812
published_at 2026-04-01T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.7691
published_at 2026-04-21T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-12T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76872
published_at 2026-04-13T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-16T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76919
published_at 2026-04-18T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-04T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-07T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.7686
published_at 2026-04-08T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-09T12:55:00Z
11
value 0.00989
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2201
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951766
reference_id 1951766
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951766
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2201
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c8x-j238-bbgz
14
url VCID-4d3p-r6am-xucc
vulnerability_id VCID-4d3p-r6am-xucc
summary mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35623
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29549
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29616
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29437
published_at 2026-04-21T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29544
published_at 2026-04-12T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29491
published_at 2026-04-13T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.2951
published_at 2026-04-16T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29483
published_at 2026-04-18T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29665
published_at 2026-04-04T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29486
published_at 2026-04-07T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29587
published_at 2026-04-09T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29589
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35623
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016109
reference_id 2016109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016109
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:26Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35623
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4d3p-r6am-xucc
15
url VCID-4jnd-s39x-a3e5
vulnerability_id VCID-4jnd-s39x-a3e5
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35638
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60637
published_at 2026-04-01T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60711
published_at 2026-04-02T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60809
published_at 2026-04-18T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60794
published_at 2026-04-21T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.6078
published_at 2026-04-12T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-13T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60804
published_at 2026-04-16T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.6074
published_at 2026-04-04T12:55:00Z
8
value 0.00401
scoring_system epss
scoring_elements 0.60706
published_at 2026-04-07T12:55:00Z
9
value 0.00401
scoring_system epss
scoring_elements 0.60755
published_at 2026-04-08T12:55:00Z
10
value 0.00401
scoring_system epss
scoring_elements 0.6077
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35638
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016127
reference_id 2016127
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016127
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:11Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35638
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jnd-s39x-a3e5
16
url VCID-4qkm-twqk-nud6
vulnerability_id VCID-4qkm-twqk-nud6
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2300
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54194
published_at 2026-04-01T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54214
published_at 2026-04-02T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54302
published_at 2026-04-21T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54317
published_at 2026-04-16T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54299
published_at 2026-04-12T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54278
published_at 2026-04-13T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54322
published_at 2026-04-18T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-04T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-07T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-08T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2300
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951781
reference_id 1951781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951781
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2300
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qkm-twqk-nud6
17
url VCID-4wes-5yrc-wkcc
vulnerability_id VCID-4wes-5yrc-wkcc
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35641
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35641
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016130
reference_id 2016130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016130
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:08Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35641
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wes-5yrc-wkcc
18
url VCID-4zyv-b7d8-t7ec
vulnerability_id VCID-4zyv-b7d8-t7ec
summary mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2171
reference_id
reference_type
scores
0
value 0.00962
scoring_system epss
scoring_elements 0.76432
published_at 2026-04-01T12:55:00Z
1
value 0.00962
scoring_system epss
scoring_elements 0.76436
published_at 2026-04-02T12:55:00Z
2
value 0.00962
scoring_system epss
scoring_elements 0.76524
published_at 2026-04-21T12:55:00Z
3
value 0.00962
scoring_system epss
scoring_elements 0.76465
published_at 2026-04-04T12:55:00Z
4
value 0.00962
scoring_system epss
scoring_elements 0.76447
published_at 2026-04-07T12:55:00Z
5
value 0.00962
scoring_system epss
scoring_elements 0.76479
published_at 2026-04-08T12:55:00Z
6
value 0.00962
scoring_system epss
scoring_elements 0.76493
published_at 2026-04-09T12:55:00Z
7
value 0.00962
scoring_system epss
scoring_elements 0.76519
published_at 2026-04-11T12:55:00Z
8
value 0.00962
scoring_system epss
scoring_elements 0.76498
published_at 2026-04-12T12:55:00Z
9
value 0.00962
scoring_system epss
scoring_elements 0.76492
published_at 2026-04-13T12:55:00Z
10
value 0.00962
scoring_system epss
scoring_elements 0.76532
published_at 2026-04-16T12:55:00Z
11
value 0.00962
scoring_system epss
scoring_elements 0.76536
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2171
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951758
reference_id 1951758
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951758
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
9
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
10
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2171
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zyv-b7d8-t7ec
19
url VCID-537e-defy-1qgh
vulnerability_id VCID-537e-defy-1qgh
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2232
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30159
published_at 2026-04-09T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30195
published_at 2026-04-02T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30015
published_at 2026-04-21T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30119
published_at 2026-04-12T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30069
published_at 2026-04-13T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30083
published_at 2026-04-16T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.3006
published_at 2026-04-18T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30244
published_at 2026-04-04T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30063
published_at 2026-04-07T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30123
published_at 2026-04-08T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30162
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2232
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951776
reference_id 1951776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951776
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2232
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-537e-defy-1qgh
20
url VCID-5hjv-8tfx-ckbx
vulnerability_id VCID-5hjv-8tfx-ckbx
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35634
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35634
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016121
reference_id 2016121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016121
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:15Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35634
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjv-8tfx-ckbx
21
url VCID-69yx-qkan-d7d4
vulnerability_id VCID-69yx-qkan-d7d4
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21600
reference_id
reference_type
scores
0
value 0.01312
scoring_system epss
scoring_elements 0.79768
published_at 2026-04-02T12:55:00Z
1
value 0.01312
scoring_system epss
scoring_elements 0.79842
published_at 2026-04-21T12:55:00Z
2
value 0.01312
scoring_system epss
scoring_elements 0.79818
published_at 2026-04-12T12:55:00Z
3
value 0.01312
scoring_system epss
scoring_elements 0.7981
published_at 2026-04-13T12:55:00Z
4
value 0.01312
scoring_system epss
scoring_elements 0.79838
published_at 2026-04-16T12:55:00Z
5
value 0.01312
scoring_system epss
scoring_elements 0.79839
published_at 2026-04-18T12:55:00Z
6
value 0.01312
scoring_system epss
scoring_elements 0.79789
published_at 2026-04-04T12:55:00Z
7
value 0.01312
scoring_system epss
scoring_elements 0.79775
published_at 2026-04-07T12:55:00Z
8
value 0.01312
scoring_system epss
scoring_elements 0.79804
published_at 2026-04-08T12:55:00Z
9
value 0.01312
scoring_system epss
scoring_elements 0.79812
published_at 2026-04-09T12:55:00Z
10
value 0.01312
scoring_system epss
scoring_elements 0.79834
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21600
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142864
reference_id 2142864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142864
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T15:25:23Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2022-21600
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69yx-qkan-d7d4
22
url VCID-6dtf-9d7c-buep
vulnerability_id VCID-6dtf-9d7c-buep
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2293
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76812
published_at 2026-04-01T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.7691
published_at 2026-04-21T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-12T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76872
published_at 2026-04-13T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-16T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76919
published_at 2026-04-18T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-04T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-07T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.7686
published_at 2026-04-08T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-09T12:55:00Z
11
value 0.00989
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2293
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951778
reference_id 1951778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951778
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2293
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dtf-9d7c-buep
23
url VCID-6kqv-c42t-jqbj
vulnerability_id VCID-6kqv-c42t-jqbj
summary Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35594
reference_id
reference_type
scores
0
value 0.39342
scoring_system epss
scoring_elements 0.97304
published_at 2026-04-21T12:55:00Z
1
value 0.39342
scoring_system epss
scoring_elements 0.97274
published_at 2026-04-02T12:55:00Z
2
value 0.39342
scoring_system epss
scoring_elements 0.97288
published_at 2026-04-09T12:55:00Z
3
value 0.39342
scoring_system epss
scoring_elements 0.97291
published_at 2026-04-11T12:55:00Z
4
value 0.39342
scoring_system epss
scoring_elements 0.97292
published_at 2026-04-13T12:55:00Z
5
value 0.39342
scoring_system epss
scoring_elements 0.973
published_at 2026-04-16T12:55:00Z
6
value 0.39342
scoring_system epss
scoring_elements 0.97303
published_at 2026-04-18T12:55:00Z
7
value 0.39342
scoring_system epss
scoring_elements 0.97269
published_at 2026-04-01T12:55:00Z
8
value 0.39342
scoring_system epss
scoring_elements 0.97279
published_at 2026-04-04T12:55:00Z
9
value 0.39342
scoring_system epss
scoring_elements 0.9728
published_at 2026-04-07T12:55:00Z
10
value 0.39342
scoring_system epss
scoring_elements 0.97287
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35594
1
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:51Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-1227/
reference_id ZDI-21-1227
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:51Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-1227/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35594
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6kqv-c42t-jqbj
24
url VCID-77bs-kuvf-eua3
vulnerability_id VCID-77bs-kuvf-eua3
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2170
reference_id
reference_type
scores
0
value 0.01233
scoring_system epss
scoring_elements 0.79134
published_at 2026-04-01T12:55:00Z
1
value 0.01233
scoring_system epss
scoring_elements 0.7914
published_at 2026-04-02T12:55:00Z
2
value 0.01233
scoring_system epss
scoring_elements 0.79208
published_at 2026-04-21T12:55:00Z
3
value 0.01233
scoring_system epss
scoring_elements 0.79165
published_at 2026-04-04T12:55:00Z
4
value 0.01233
scoring_system epss
scoring_elements 0.79151
published_at 2026-04-07T12:55:00Z
5
value 0.01233
scoring_system epss
scoring_elements 0.79176
published_at 2026-04-08T12:55:00Z
6
value 0.01233
scoring_system epss
scoring_elements 0.79184
published_at 2026-04-09T12:55:00Z
7
value 0.01233
scoring_system epss
scoring_elements 0.79209
published_at 2026-04-11T12:55:00Z
8
value 0.01233
scoring_system epss
scoring_elements 0.79194
published_at 2026-04-12T12:55:00Z
9
value 0.01233
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-13T12:55:00Z
10
value 0.01233
scoring_system epss
scoring_elements 0.79211
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2170
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951757
reference_id 1951757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951757
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
9
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2170
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-77bs-kuvf-eua3
25
url VCID-7shp-crcm-vqfe
vulnerability_id VCID-7shp-crcm-vqfe
summary mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2226
reference_id
reference_type
scores
0
value 0.01732
scoring_system epss
scoring_elements 0.82386
published_at 2026-04-01T12:55:00Z
1
value 0.01732
scoring_system epss
scoring_elements 0.82401
published_at 2026-04-02T12:55:00Z
2
value 0.01732
scoring_system epss
scoring_elements 0.82499
published_at 2026-04-21T12:55:00Z
3
value 0.01732
scoring_system epss
scoring_elements 0.82463
published_at 2026-04-12T12:55:00Z
4
value 0.01732
scoring_system epss
scoring_elements 0.82459
published_at 2026-04-13T12:55:00Z
5
value 0.01732
scoring_system epss
scoring_elements 0.82494
published_at 2026-04-16T12:55:00Z
6
value 0.01732
scoring_system epss
scoring_elements 0.82495
published_at 2026-04-18T12:55:00Z
7
value 0.01732
scoring_system epss
scoring_elements 0.82419
published_at 2026-04-04T12:55:00Z
8
value 0.01732
scoring_system epss
scoring_elements 0.82415
published_at 2026-04-07T12:55:00Z
9
value 0.01732
scoring_system epss
scoring_elements 0.82443
published_at 2026-04-08T12:55:00Z
10
value 0.01732
scoring_system epss
scoring_elements 0.82449
published_at 2026-04-09T12:55:00Z
11
value 0.01732
scoring_system epss
scoring_elements 0.82468
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2226
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951774
reference_id 1951774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951774
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
7
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2226
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7shp-crcm-vqfe
26
url VCID-8m18-147e-4ka4
vulnerability_id VCID-8m18-147e-4ka4
summary mysql: Server: Options unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35630
reference_id
reference_type
scores
0
value 0.00416
scoring_system epss
scoring_elements 0.6157
published_at 2026-04-01T12:55:00Z
1
value 0.00416
scoring_system epss
scoring_elements 0.61644
published_at 2026-04-02T12:55:00Z
2
value 0.00416
scoring_system epss
scoring_elements 0.61729
published_at 2026-04-21T12:55:00Z
3
value 0.00416
scoring_system epss
scoring_elements 0.61719
published_at 2026-04-12T12:55:00Z
4
value 0.00416
scoring_system epss
scoring_elements 0.61699
published_at 2026-04-13T12:55:00Z
5
value 0.00416
scoring_system epss
scoring_elements 0.6174
published_at 2026-04-16T12:55:00Z
6
value 0.00416
scoring_system epss
scoring_elements 0.61746
published_at 2026-04-18T12:55:00Z
7
value 0.00416
scoring_system epss
scoring_elements 0.61674
published_at 2026-04-04T12:55:00Z
8
value 0.00416
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-07T12:55:00Z
9
value 0.00416
scoring_system epss
scoring_elements 0.61694
published_at 2026-04-08T12:55:00Z
10
value 0.00416
scoring_system epss
scoring_elements 0.61709
published_at 2026-04-09T12:55:00Z
11
value 0.00416
scoring_system epss
scoring_elements 0.61731
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35630
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016117
reference_id 2016117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016117
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:19Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35630
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8m18-147e-4ka4
27
url VCID-8xpx-1fpf-m3fa
vulnerability_id VCID-8xpx-1fpf-m3fa
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2215
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76812
published_at 2026-04-01T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.7691
published_at 2026-04-21T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-12T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76872
published_at 2026-04-13T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-16T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76919
published_at 2026-04-18T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-04T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-07T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.7686
published_at 2026-04-08T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-09T12:55:00Z
11
value 0.00989
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2215
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951772
reference_id 1951772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951772
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2215
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8xpx-1fpf-m3fa
28
url VCID-9dt5-yek1-wfg9
vulnerability_id VCID-9dt5-yek1-wfg9
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2194
reference_id
reference_type
scores
0
value 0.0117
scoring_system epss
scoring_elements 0.78612
published_at 2026-04-01T12:55:00Z
1
value 0.0117
scoring_system epss
scoring_elements 0.78619
published_at 2026-04-02T12:55:00Z
2
value 0.0117
scoring_system epss
scoring_elements 0.78684
published_at 2026-04-21T12:55:00Z
3
value 0.0117
scoring_system epss
scoring_elements 0.78649
published_at 2026-04-04T12:55:00Z
4
value 0.0117
scoring_system epss
scoring_elements 0.7863
published_at 2026-04-07T12:55:00Z
5
value 0.0117
scoring_system epss
scoring_elements 0.78656
published_at 2026-04-08T12:55:00Z
6
value 0.0117
scoring_system epss
scoring_elements 0.78663
published_at 2026-04-09T12:55:00Z
7
value 0.0117
scoring_system epss
scoring_elements 0.78688
published_at 2026-04-11T12:55:00Z
8
value 0.0117
scoring_system epss
scoring_elements 0.78669
published_at 2026-04-12T12:55:00Z
9
value 0.0117
scoring_system epss
scoring_elements 0.78661
published_at 2026-04-13T12:55:00Z
10
value 0.0117
scoring_system epss
scoring_elements 0.7869
published_at 2026-04-16T12:55:00Z
11
value 0.0117
scoring_system epss
scoring_elements 0.78687
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2194
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951764
reference_id 1951764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951764
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
7
reference_url https://access.redhat.com/errata/RHSA-2020:5246
reference_id RHSA-2020:5246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5246
8
reference_url https://access.redhat.com/errata/RHSA-2020:5500
reference_id RHSA-2020:5500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5500
9
reference_url https://access.redhat.com/errata/RHSA-2020:5654
reference_id RHSA-2020:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5654
10
reference_url https://access.redhat.com/errata/RHSA-2020:5663
reference_id RHSA-2020:5663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5663
11
reference_url https://access.redhat.com/errata/RHSA-2020:5665
reference_id RHSA-2020:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5665
12
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
13
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
15
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
16
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2194
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dt5-yek1-wfg9
29
url VCID-ac7j-w1pc-z3h2
vulnerability_id VCID-ac7j-w1pc-z3h2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35610
reference_id
reference_type
scores
0
value 0.00754
scoring_system epss
scoring_elements 0.73167
published_at 2026-04-01T12:55:00Z
1
value 0.00754
scoring_system epss
scoring_elements 0.73177
published_at 2026-04-02T12:55:00Z
2
value 0.00754
scoring_system epss
scoring_elements 0.73265
published_at 2026-04-21T12:55:00Z
3
value 0.00754
scoring_system epss
scoring_elements 0.73197
published_at 2026-04-04T12:55:00Z
4
value 0.00754
scoring_system epss
scoring_elements 0.73172
published_at 2026-04-07T12:55:00Z
5
value 0.00754
scoring_system epss
scoring_elements 0.73208
published_at 2026-04-08T12:55:00Z
6
value 0.00754
scoring_system epss
scoring_elements 0.73222
published_at 2026-04-09T12:55:00Z
7
value 0.00754
scoring_system epss
scoring_elements 0.73247
published_at 2026-04-11T12:55:00Z
8
value 0.00754
scoring_system epss
scoring_elements 0.73228
published_at 2026-04-12T12:55:00Z
9
value 0.00754
scoring_system epss
scoring_elements 0.73221
published_at 2026-04-13T12:55:00Z
10
value 0.00754
scoring_system epss
scoring_elements 0.73264
published_at 2026-04-16T12:55:00Z
11
value 0.00754
scoring_system epss
scoring_elements 0.73273
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35610
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016106
reference_id 2016106
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016106
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35610
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ac7j-w1pc-z3h2
30
url VCID-afgm-qfjk-77h2
vulnerability_id VCID-afgm-qfjk-77h2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35643
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35643
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016132
reference_id 2016132
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016132
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:06Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35643
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-afgm-qfjk-77h2
31
url VCID-bbzn-prse-7fhm
vulnerability_id VCID-bbzn-prse-7fhm
summary mysql: Server: PS unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35637
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44157
published_at 2026-04-01T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44222
published_at 2026-04-02T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44196
published_at 2026-04-21T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44218
published_at 2026-04-12T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44219
published_at 2026-04-13T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44278
published_at 2026-04-16T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44268
published_at 2026-04-18T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44245
published_at 2026-04-04T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44179
published_at 2026-04-07T12:55:00Z
9
value 0.00216
scoring_system epss
scoring_elements 0.4423
published_at 2026-04-08T12:55:00Z
10
value 0.00216
scoring_system epss
scoring_elements 0.44234
published_at 2026-04-09T12:55:00Z
11
value 0.00216
scoring_system epss
scoring_elements 0.44251
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35637
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016126
reference_id 2016126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016126
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:12Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35637
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bbzn-prse-7fhm
32
url VCID-bcv2-xfb3-4ker
vulnerability_id VCID-bcv2-xfb3-4ker
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35642
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35642
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016131
reference_id 2016131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016131
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:07Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35642
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bcv2-xfb3-4ker
33
url VCID-bu6s-4qt6-nkfz
vulnerability_id VCID-bu6s-4qt6-nkfz
summary Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35593
reference_id
reference_type
scores
0
value 0.39342
scoring_system epss
scoring_elements 0.97304
published_at 2026-04-21T12:55:00Z
1
value 0.39342
scoring_system epss
scoring_elements 0.97274
published_at 2026-04-02T12:55:00Z
2
value 0.39342
scoring_system epss
scoring_elements 0.97288
published_at 2026-04-09T12:55:00Z
3
value 0.39342
scoring_system epss
scoring_elements 0.97291
published_at 2026-04-11T12:55:00Z
4
value 0.39342
scoring_system epss
scoring_elements 0.97292
published_at 2026-04-13T12:55:00Z
5
value 0.39342
scoring_system epss
scoring_elements 0.973
published_at 2026-04-16T12:55:00Z
6
value 0.39342
scoring_system epss
scoring_elements 0.97303
published_at 2026-04-18T12:55:00Z
7
value 0.39342
scoring_system epss
scoring_elements 0.97269
published_at 2026-04-01T12:55:00Z
8
value 0.39342
scoring_system epss
scoring_elements 0.97279
published_at 2026-04-04T12:55:00Z
9
value 0.39342
scoring_system epss
scoring_elements 0.9728
published_at 2026-04-07T12:55:00Z
10
value 0.39342
scoring_system epss
scoring_elements 0.97287
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35593
1
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:53Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-1229/
reference_id ZDI-21-1229
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:53Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-1229/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35593
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bu6s-4qt6-nkfz
34
url VCID-byru-kqru-gfe6
vulnerability_id VCID-byru-kqru-gfe6
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35591
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.59899
published_at 2026-04-01T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.59977
published_at 2026-04-02T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.60056
published_at 2026-04-21T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.60002
published_at 2026-04-04T12:55:00Z
4
value 0.00389
scoring_system epss
scoring_elements 0.59973
published_at 2026-04-07T12:55:00Z
5
value 0.00389
scoring_system epss
scoring_elements 0.60023
published_at 2026-04-08T12:55:00Z
6
value 0.00389
scoring_system epss
scoring_elements 0.60036
published_at 2026-04-09T12:55:00Z
7
value 0.00389
scoring_system epss
scoring_elements 0.60057
published_at 2026-04-11T12:55:00Z
8
value 0.00389
scoring_system epss
scoring_elements 0.60042
published_at 2026-04-12T12:55:00Z
9
value 0.00389
scoring_system epss
scoring_elements 0.60025
published_at 2026-04-13T12:55:00Z
10
value 0.00389
scoring_system epss
scoring_elements 0.60064
published_at 2026-04-16T12:55:00Z
11
value 0.00389
scoring_system epss
scoring_elements 0.60071
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35591
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016097
reference_id 2016097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016097
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35591
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byru-kqru-gfe6
35
url VCID-c95m-82hu-1qbg
vulnerability_id VCID-c95m-82hu-1qbg
summary Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35592
reference_id
reference_type
scores
0
value 0.28625
scoring_system epss
scoring_elements 0.96551
published_at 2026-04-21T12:55:00Z
1
value 0.28625
scoring_system epss
scoring_elements 0.96513
published_at 2026-04-02T12:55:00Z
2
value 0.28625
scoring_system epss
scoring_elements 0.96531
published_at 2026-04-09T12:55:00Z
3
value 0.28625
scoring_system epss
scoring_elements 0.96534
published_at 2026-04-12T12:55:00Z
4
value 0.28625
scoring_system epss
scoring_elements 0.96537
published_at 2026-04-13T12:55:00Z
5
value 0.28625
scoring_system epss
scoring_elements 0.96543
published_at 2026-04-16T12:55:00Z
6
value 0.28625
scoring_system epss
scoring_elements 0.96549
published_at 2026-04-18T12:55:00Z
7
value 0.28625
scoring_system epss
scoring_elements 0.96504
published_at 2026-04-01T12:55:00Z
8
value 0.28625
scoring_system epss
scoring_elements 0.96517
published_at 2026-04-04T12:55:00Z
9
value 0.28625
scoring_system epss
scoring_elements 0.96521
published_at 2026-04-07T12:55:00Z
10
value 0.28625
scoring_system epss
scoring_elements 0.96529
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35592
1
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:54Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-1228/
reference_id ZDI-21-1228
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:54Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-1228/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35592
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c95m-82hu-1qbg
36
url VCID-dv9f-cgsn-skgf
vulnerability_id VCID-dv9f-cgsn-skgf
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2278
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76812
published_at 2026-04-01T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.7691
published_at 2026-04-21T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-12T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76872
published_at 2026-04-13T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-16T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76919
published_at 2026-04-18T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-04T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-07T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.7686
published_at 2026-04-08T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-09T12:55:00Z
11
value 0.00989
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2278
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951777
reference_id 1951777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951777
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2278
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dv9f-cgsn-skgf
37
url VCID-e7y6-8acx-tuh8
vulnerability_id VCID-e7y6-8acx-tuh8
summary mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2208
reference_id
reference_type
scores
0
value 0.01375
scoring_system epss
scoring_elements 0.8019
published_at 2026-04-01T12:55:00Z
1
value 0.01375
scoring_system epss
scoring_elements 0.80197
published_at 2026-04-02T12:55:00Z
2
value 0.01375
scoring_system epss
scoring_elements 0.80277
published_at 2026-04-21T12:55:00Z
3
value 0.01375
scoring_system epss
scoring_elements 0.80248
published_at 2026-04-12T12:55:00Z
4
value 0.01375
scoring_system epss
scoring_elements 0.80242
published_at 2026-04-13T12:55:00Z
5
value 0.01375
scoring_system epss
scoring_elements 0.80272
published_at 2026-04-16T12:55:00Z
6
value 0.01375
scoring_system epss
scoring_elements 0.80274
published_at 2026-04-18T12:55:00Z
7
value 0.01375
scoring_system epss
scoring_elements 0.80217
published_at 2026-04-04T12:55:00Z
8
value 0.01375
scoring_system epss
scoring_elements 0.80206
published_at 2026-04-07T12:55:00Z
9
value 0.01375
scoring_system epss
scoring_elements 0.80234
published_at 2026-04-08T12:55:00Z
10
value 0.01375
scoring_system epss
scoring_elements 0.80244
published_at 2026-04-09T12:55:00Z
11
value 0.01375
scoring_system epss
scoring_elements 0.80263
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2208
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951769
reference_id 1951769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951769
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2208
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7y6-8acx-tuh8
38
url VCID-efvc-pezb-yuhw
vulnerability_id VCID-efvc-pezb-yuhw
summary Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35590
reference_id
reference_type
scores
0
value 0.28894
scoring_system epss
scoring_elements 0.96575
published_at 2026-04-21T12:55:00Z
1
value 0.28894
scoring_system epss
scoring_elements 0.96537
published_at 2026-04-02T12:55:00Z
2
value 0.28894
scoring_system epss
scoring_elements 0.96555
published_at 2026-04-09T12:55:00Z
3
value 0.28894
scoring_system epss
scoring_elements 0.96558
published_at 2026-04-12T12:55:00Z
4
value 0.28894
scoring_system epss
scoring_elements 0.9656
published_at 2026-04-13T12:55:00Z
5
value 0.28894
scoring_system epss
scoring_elements 0.96567
published_at 2026-04-16T12:55:00Z
6
value 0.28894
scoring_system epss
scoring_elements 0.96572
published_at 2026-04-18T12:55:00Z
7
value 0.28894
scoring_system epss
scoring_elements 0.96528
published_at 2026-04-01T12:55:00Z
8
value 0.28894
scoring_system epss
scoring_elements 0.96542
published_at 2026-04-04T12:55:00Z
9
value 0.28894
scoring_system epss
scoring_elements 0.96545
published_at 2026-04-07T12:55:00Z
10
value 0.28894
scoring_system epss
scoring_elements 0.96553
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35590
1
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:55Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-1226/
reference_id ZDI-21-1226
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:55Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-1226/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35590
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-efvc-pezb-yuhw
39
url VCID-fvuq-5szu-akfn
vulnerability_id VCID-fvuq-5szu-akfn
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2298
reference_id
reference_type
scores
0
value 0.01537
scoring_system epss
scoring_elements 0.81284
published_at 2026-04-01T12:55:00Z
1
value 0.01537
scoring_system epss
scoring_elements 0.81293
published_at 2026-04-02T12:55:00Z
2
value 0.01537
scoring_system epss
scoring_elements 0.81386
published_at 2026-04-21T12:55:00Z
3
value 0.01537
scoring_system epss
scoring_elements 0.81368
published_at 2026-04-11T12:55:00Z
4
value 0.01537
scoring_system epss
scoring_elements 0.81354
published_at 2026-04-12T12:55:00Z
5
value 0.01537
scoring_system epss
scoring_elements 0.81346
published_at 2026-04-13T12:55:00Z
6
value 0.01537
scoring_system epss
scoring_elements 0.81384
published_at 2026-04-16T12:55:00Z
7
value 0.01537
scoring_system epss
scoring_elements 0.81315
published_at 2026-04-04T12:55:00Z
8
value 0.01537
scoring_system epss
scoring_elements 0.81314
published_at 2026-04-07T12:55:00Z
9
value 0.01537
scoring_system epss
scoring_elements 0.81343
published_at 2026-04-08T12:55:00Z
10
value 0.01537
scoring_system epss
scoring_elements 0.81348
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2298
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951779
reference_id 1951779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951779
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2298
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fvuq-5szu-akfn
40
url VCID-g1py-km6y-uka8
vulnerability_id VCID-g1py-km6y-uka8
summary mysql: Server: Packaging unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2307
reference_id
reference_type
scores
0
value 0.00448
scoring_system epss
scoring_elements 0.63453
published_at 2026-04-01T12:55:00Z
1
value 0.00448
scoring_system epss
scoring_elements 0.63513
published_at 2026-04-02T12:55:00Z
2
value 0.00448
scoring_system epss
scoring_elements 0.63567
published_at 2026-04-21T12:55:00Z
3
value 0.00448
scoring_system epss
scoring_elements 0.63589
published_at 2026-04-11T12:55:00Z
4
value 0.00448
scoring_system epss
scoring_elements 0.63574
published_at 2026-04-12T12:55:00Z
5
value 0.00448
scoring_system epss
scoring_elements 0.63576
published_at 2026-04-16T12:55:00Z
6
value 0.00448
scoring_system epss
scoring_elements 0.63584
published_at 2026-04-18T12:55:00Z
7
value 0.00448
scoring_system epss
scoring_elements 0.6354
published_at 2026-04-13T12:55:00Z
8
value 0.00448
scoring_system epss
scoring_elements 0.63504
published_at 2026-04-07T12:55:00Z
9
value 0.00448
scoring_system epss
scoring_elements 0.63556
published_at 2026-04-08T12:55:00Z
10
value 0.00448
scoring_system epss
scoring_elements 0.63573
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2307
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951785
reference_id 1951785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951785
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
7
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2307
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1py-km6y-uka8
41
url VCID-gb4c-ypuu-gfgq
vulnerability_id VCID-gb4c-ypuu-gfgq
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2164
reference_id
reference_type
scores
0
value 0.01233
scoring_system epss
scoring_elements 0.79134
published_at 2026-04-01T12:55:00Z
1
value 0.01233
scoring_system epss
scoring_elements 0.7914
published_at 2026-04-02T12:55:00Z
2
value 0.01233
scoring_system epss
scoring_elements 0.79208
published_at 2026-04-21T12:55:00Z
3
value 0.01233
scoring_system epss
scoring_elements 0.79165
published_at 2026-04-04T12:55:00Z
4
value 0.01233
scoring_system epss
scoring_elements 0.79151
published_at 2026-04-07T12:55:00Z
5
value 0.01233
scoring_system epss
scoring_elements 0.79176
published_at 2026-04-08T12:55:00Z
6
value 0.01233
scoring_system epss
scoring_elements 0.79184
published_at 2026-04-09T12:55:00Z
7
value 0.01233
scoring_system epss
scoring_elements 0.79209
published_at 2026-04-11T12:55:00Z
8
value 0.01233
scoring_system epss
scoring_elements 0.79194
published_at 2026-04-12T12:55:00Z
9
value 0.01233
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-13T12:55:00Z
10
value 0.01233
scoring_system epss
scoring_elements 0.79211
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2164
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951754
reference_id 1951754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951754
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
9
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2164
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gb4c-ypuu-gfgq
42
url VCID-gk57-6tsn-4yhs
vulnerability_id VCID-gk57-6tsn-4yhs
summary mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35632
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.3087
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30999
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30846
published_at 2026-04-21T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30914
published_at 2026-04-12T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30869
published_at 2026-04-13T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.309
published_at 2026-04-16T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.3088
published_at 2026-04-18T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.31047
published_at 2026-04-04T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30865
published_at 2026-04-07T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30923
published_at 2026-04-08T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30953
published_at 2026-04-09T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.30956
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35632
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016119
reference_id 2016119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016119
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:17Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35632
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gk57-6tsn-4yhs
43
url VCID-hhep-s9mq-6kbb
vulnerability_id VCID-hhep-s9mq-6kbb
summary mysql: Server: DDL unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35640
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30468
published_at 2026-04-01T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30496
published_at 2026-04-02T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30312
published_at 2026-04-21T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30406
published_at 2026-04-12T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30357
published_at 2026-04-13T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30374
published_at 2026-04-16T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30356
published_at 2026-04-18T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30542
published_at 2026-04-04T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30353
published_at 2026-04-07T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30413
published_at 2026-04-08T12:55:00Z
10
value 0.00117
scoring_system epss
scoring_elements 0.30448
published_at 2026-04-09T12:55:00Z
11
value 0.00117
scoring_system epss
scoring_elements 0.30449
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35640
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016129
reference_id 2016129
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016129
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:09Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35640
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hhep-s9mq-6kbb
44
url VCID-hsue-93wh-mygh
vulnerability_id VCID-hsue-93wh-mygh
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35629
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48128
published_at 2026-04-01T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
11
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35629
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016116
reference_id 2016116
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016116
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:20Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35629
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hsue-93wh-mygh
45
url VCID-hwf4-mqxw-4ycq
vulnerability_id VCID-hwf4-mqxw-4ycq
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35612
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59261
published_at 2026-04-01T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59335
published_at 2026-04-02T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59393
published_at 2026-04-21T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59391
published_at 2026-04-12T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59373
published_at 2026-04-13T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59405
published_at 2026-04-16T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59412
published_at 2026-04-18T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59358
published_at 2026-04-04T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59324
published_at 2026-04-07T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59375
published_at 2026-04-08T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59388
published_at 2026-04-09T12:55:00Z
11
value 0.00378
scoring_system epss
scoring_elements 0.59407
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35612
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016107
reference_id 2016107
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016107
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:31Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35612
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hwf4-mqxw-4ycq
46
url VCID-jkxq-q4u2-6fb6
vulnerability_id VCID-jkxq-q4u2-6fb6
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35575
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60158
published_at 2026-04-01T12:55:00Z
1
value 0.00393
scoring_system epss
scoring_elements 0.60234
published_at 2026-04-02T12:55:00Z
2
value 0.00393
scoring_system epss
scoring_elements 0.60314
published_at 2026-04-21T12:55:00Z
3
value 0.00393
scoring_system epss
scoring_elements 0.6026
published_at 2026-04-04T12:55:00Z
4
value 0.00393
scoring_system epss
scoring_elements 0.60228
published_at 2026-04-07T12:55:00Z
5
value 0.00393
scoring_system epss
scoring_elements 0.60277
published_at 2026-04-08T12:55:00Z
6
value 0.00393
scoring_system epss
scoring_elements 0.60292
published_at 2026-04-09T12:55:00Z
7
value 0.00393
scoring_system epss
scoring_elements 0.60313
published_at 2026-04-11T12:55:00Z
8
value 0.00393
scoring_system epss
scoring_elements 0.60299
published_at 2026-04-12T12:55:00Z
9
value 0.00393
scoring_system epss
scoring_elements 0.60281
published_at 2026-04-13T12:55:00Z
10
value 0.00393
scoring_system epss
scoring_elements 0.60321
published_at 2026-04-16T12:55:00Z
11
value 0.00393
scoring_system epss
scoring_elements 0.60328
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35575
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016094
reference_id 2016094
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016094
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35575
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jkxq-q4u2-6fb6
47
url VCID-jntg-92ur-nbfa
vulnerability_id VCID-jntg-92ur-nbfa
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2193
reference_id
reference_type
scores
0
value 0.01233
scoring_system epss
scoring_elements 0.79134
published_at 2026-04-01T12:55:00Z
1
value 0.01233
scoring_system epss
scoring_elements 0.7914
published_at 2026-04-02T12:55:00Z
2
value 0.01233
scoring_system epss
scoring_elements 0.79208
published_at 2026-04-21T12:55:00Z
3
value 0.01233
scoring_system epss
scoring_elements 0.79165
published_at 2026-04-04T12:55:00Z
4
value 0.01233
scoring_system epss
scoring_elements 0.79151
published_at 2026-04-07T12:55:00Z
5
value 0.01233
scoring_system epss
scoring_elements 0.79176
published_at 2026-04-08T12:55:00Z
6
value 0.01233
scoring_system epss
scoring_elements 0.79184
published_at 2026-04-09T12:55:00Z
7
value 0.01233
scoring_system epss
scoring_elements 0.79209
published_at 2026-04-11T12:55:00Z
8
value 0.01233
scoring_system epss
scoring_elements 0.79194
published_at 2026-04-12T12:55:00Z
9
value 0.01233
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-13T12:55:00Z
10
value 0.01233
scoring_system epss
scoring_elements 0.79211
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2193
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951763
reference_id 1951763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951763
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
9
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2193
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jntg-92ur-nbfa
48
url VCID-k1mw-4auu-v7em
vulnerability_id VCID-k1mw-4auu-v7em
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35624
reference_id
reference_type
scores
0
value 0.00301
scoring_system epss
scoring_elements 0.53371
published_at 2026-04-01T12:55:00Z
1
value 0.00301
scoring_system epss
scoring_elements 0.53395
published_at 2026-04-02T12:55:00Z
2
value 0.00301
scoring_system epss
scoring_elements 0.53477
published_at 2026-04-21T12:55:00Z
3
value 0.00301
scoring_system epss
scoring_elements 0.5347
published_at 2026-04-12T12:55:00Z
4
value 0.00301
scoring_system epss
scoring_elements 0.53454
published_at 2026-04-13T12:55:00Z
5
value 0.00301
scoring_system epss
scoring_elements 0.53491
published_at 2026-04-16T12:55:00Z
6
value 0.00301
scoring_system epss
scoring_elements 0.53496
published_at 2026-04-18T12:55:00Z
7
value 0.00301
scoring_system epss
scoring_elements 0.53421
published_at 2026-04-04T12:55:00Z
8
value 0.00301
scoring_system epss
scoring_elements 0.5339
published_at 2026-04-07T12:55:00Z
9
value 0.00301
scoring_system epss
scoring_elements 0.53442
published_at 2026-04-08T12:55:00Z
10
value 0.00301
scoring_system epss
scoring_elements 0.53438
published_at 2026-04-09T12:55:00Z
11
value 0.00301
scoring_system epss
scoring_elements 0.53487
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35624
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016110
reference_id 2016110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016110
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:25Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
7
reference_url https://usn.ubuntu.com/5123-2/
reference_id USN-5123-2
reference_type
scores
url https://usn.ubuntu.com/5123-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35624
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k1mw-4auu-v7em
49
url VCID-k37x-pg16-bqbb
vulnerability_id VCID-k37x-pg16-bqbb
summary mysql: Server: Logging unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35633
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40135
published_at 2026-04-01T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40286
published_at 2026-04-02T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40192
published_at 2026-04-21T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40272
published_at 2026-04-12T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40252
published_at 2026-04-13T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40299
published_at 2026-04-16T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40268
published_at 2026-04-18T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40311
published_at 2026-04-04T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40233
published_at 2026-04-07T12:55:00Z
9
value 0.00185
scoring_system epss
scoring_elements 0.40285
published_at 2026-04-08T12:55:00Z
10
value 0.00185
scoring_system epss
scoring_elements 0.40297
published_at 2026-04-09T12:55:00Z
11
value 0.00185
scoring_system epss
scoring_elements 0.40309
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35633
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016120
reference_id 2016120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016120
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:16Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35633
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k37x-pg16-bqbb
50
url VCID-k3vn-aruy-nfan
vulnerability_id VCID-k3vn-aruy-nfan
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2174
reference_id
reference_type
scores
0
value 0.00945
scoring_system epss
scoring_elements 0.76249
published_at 2026-04-01T12:55:00Z
1
value 0.00945
scoring_system epss
scoring_elements 0.76253
published_at 2026-04-02T12:55:00Z
2
value 0.00945
scoring_system epss
scoring_elements 0.76339
published_at 2026-04-21T12:55:00Z
3
value 0.00945
scoring_system epss
scoring_elements 0.76284
published_at 2026-04-04T12:55:00Z
4
value 0.00945
scoring_system epss
scoring_elements 0.76264
published_at 2026-04-07T12:55:00Z
5
value 0.00945
scoring_system epss
scoring_elements 0.76296
published_at 2026-04-08T12:55:00Z
6
value 0.00945
scoring_system epss
scoring_elements 0.76309
published_at 2026-04-09T12:55:00Z
7
value 0.00945
scoring_system epss
scoring_elements 0.76336
published_at 2026-04-11T12:55:00Z
8
value 0.00945
scoring_system epss
scoring_elements 0.76314
published_at 2026-04-12T12:55:00Z
9
value 0.00945
scoring_system epss
scoring_elements 0.7631
published_at 2026-04-13T12:55:00Z
10
value 0.00945
scoring_system epss
scoring_elements 0.7635
published_at 2026-04-16T12:55:00Z
11
value 0.00945
scoring_system epss
scoring_elements 0.76355
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2174
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1952802
reference_id 1952802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1952802
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2174
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3vn-aruy-nfan
51
url VCID-kff6-5fr1-1khv
vulnerability_id VCID-kff6-5fr1-1khv
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2172
reference_id
reference_type
scores
0
value 0.01342
scoring_system epss
scoring_elements 0.79972
published_at 2026-04-01T12:55:00Z
1
value 0.01342
scoring_system epss
scoring_elements 0.79979
published_at 2026-04-02T12:55:00Z
2
value 0.01342
scoring_system epss
scoring_elements 0.80053
published_at 2026-04-21T12:55:00Z
3
value 0.01342
scoring_system epss
scoring_elements 0.80001
published_at 2026-04-04T12:55:00Z
4
value 0.01342
scoring_system epss
scoring_elements 0.79991
published_at 2026-04-07T12:55:00Z
5
value 0.01342
scoring_system epss
scoring_elements 0.80019
published_at 2026-04-08T12:55:00Z
6
value 0.01342
scoring_system epss
scoring_elements 0.80028
published_at 2026-04-09T12:55:00Z
7
value 0.01342
scoring_system epss
scoring_elements 0.80048
published_at 2026-04-11T12:55:00Z
8
value 0.01342
scoring_system epss
scoring_elements 0.80031
published_at 2026-04-12T12:55:00Z
9
value 0.01342
scoring_system epss
scoring_elements 0.80024
published_at 2026-04-13T12:55:00Z
10
value 0.01342
scoring_system epss
scoring_elements 0.80052
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2172
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951759
reference_id 1951759
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951759
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
9
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2172
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kff6-5fr1-1khv
52
url VCID-kg95-ffr7-fkh8
vulnerability_id VCID-kg95-ffr7-fkh8
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35644
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35644
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016133
reference_id 2016133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016133
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:05Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35644
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kg95-ffr7-fkh8
53
url VCID-mjkd-v9e6-cbbt
vulnerability_id VCID-mjkd-v9e6-cbbt
summary Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 1.8 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35618
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.5539
published_at 2026-04-16T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55327
published_at 2026-04-02T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.55394
published_at 2026-04-18T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55373
published_at 2026-04-21T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55354
published_at 2026-04-13T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55228
published_at 2026-04-01T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55351
published_at 2026-04-04T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55333
published_at 2026-04-07T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55383
published_at 2026-04-08T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55384
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35618
1
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 1.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:28Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35618
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mjkd-v9e6-cbbt
54
url VCID-muzn-dqpe-q7cr
vulnerability_id VCID-muzn-dqpe-q7cr
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2180
reference_id
reference_type
scores
0
value 0.04512
scoring_system epss
scoring_elements 0.89091
published_at 2026-04-01T12:55:00Z
1
value 0.04512
scoring_system epss
scoring_elements 0.89099
published_at 2026-04-02T12:55:00Z
2
value 0.04512
scoring_system epss
scoring_elements 0.89154
published_at 2026-04-21T12:55:00Z
3
value 0.04512
scoring_system epss
scoring_elements 0.89113
published_at 2026-04-04T12:55:00Z
4
value 0.04512
scoring_system epss
scoring_elements 0.89116
published_at 2026-04-07T12:55:00Z
5
value 0.04512
scoring_system epss
scoring_elements 0.89134
published_at 2026-04-08T12:55:00Z
6
value 0.04512
scoring_system epss
scoring_elements 0.89139
published_at 2026-04-09T12:55:00Z
7
value 0.04512
scoring_system epss
scoring_elements 0.8915
published_at 2026-04-11T12:55:00Z
8
value 0.04512
scoring_system epss
scoring_elements 0.89146
published_at 2026-04-12T12:55:00Z
9
value 0.04512
scoring_system epss
scoring_elements 0.89144
published_at 2026-04-13T12:55:00Z
10
value 0.04512
scoring_system epss
scoring_elements 0.89157
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2180
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951762
reference_id 1951762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951762
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
6
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://security.gentoo.org/glsa/202105-27
7
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://security.gentoo.org/glsa/202105-28
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
9
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
10
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
12
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
13
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2180
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-muzn-dqpe-q7cr
55
url VCID-njb2-z4kz-zybs
vulnerability_id VCID-njb2-z4kz-zybs
summary mysql: Server: Options unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2146
reference_id
reference_type
scores
0
value 0.01728
scoring_system epss
scoring_elements 0.82369
published_at 2026-04-01T12:55:00Z
1
value 0.01728
scoring_system epss
scoring_elements 0.82383
published_at 2026-04-02T12:55:00Z
2
value 0.01728
scoring_system epss
scoring_elements 0.82483
published_at 2026-04-21T12:55:00Z
3
value 0.01728
scoring_system epss
scoring_elements 0.824
published_at 2026-04-04T12:55:00Z
4
value 0.01728
scoring_system epss
scoring_elements 0.82397
published_at 2026-04-07T12:55:00Z
5
value 0.01728
scoring_system epss
scoring_elements 0.82425
published_at 2026-04-08T12:55:00Z
6
value 0.01728
scoring_system epss
scoring_elements 0.82432
published_at 2026-04-09T12:55:00Z
7
value 0.01728
scoring_system epss
scoring_elements 0.82451
published_at 2026-04-11T12:55:00Z
8
value 0.01728
scoring_system epss
scoring_elements 0.82447
published_at 2026-04-12T12:55:00Z
9
value 0.01728
scoring_system epss
scoring_elements 0.82442
published_at 2026-04-13T12:55:00Z
10
value 0.01728
scoring_system epss
scoring_elements 0.82477
published_at 2026-04-16T12:55:00Z
11
value 0.01728
scoring_system epss
scoring_elements 0.82479
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2146
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951751
reference_id 1951751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951751
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
9
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
10
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2146
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njb2-z4kz-zybs
56
url VCID-njee-wqeh-dyf1
vulnerability_id VCID-njee-wqeh-dyf1
summary Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35598
reference_id
reference_type
scores
0
value 0.39342
scoring_system epss
scoring_elements 0.97304
published_at 2026-04-21T12:55:00Z
1
value 0.39342
scoring_system epss
scoring_elements 0.97274
published_at 2026-04-02T12:55:00Z
2
value 0.39342
scoring_system epss
scoring_elements 0.97288
published_at 2026-04-09T12:55:00Z
3
value 0.39342
scoring_system epss
scoring_elements 0.97291
published_at 2026-04-11T12:55:00Z
4
value 0.39342
scoring_system epss
scoring_elements 0.97292
published_at 2026-04-13T12:55:00Z
5
value 0.39342
scoring_system epss
scoring_elements 0.973
published_at 2026-04-16T12:55:00Z
6
value 0.39342
scoring_system epss
scoring_elements 0.97303
published_at 2026-04-18T12:55:00Z
7
value 0.39342
scoring_system epss
scoring_elements 0.97269
published_at 2026-04-01T12:55:00Z
8
value 0.39342
scoring_system epss
scoring_elements 0.97279
published_at 2026-04-04T12:55:00Z
9
value 0.39342
scoring_system epss
scoring_elements 0.9728
published_at 2026-04-07T12:55:00Z
10
value 0.39342
scoring_system epss
scoring_elements 0.97287
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35598
1
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:50Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-1230/
reference_id ZDI-21-1230
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:50Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-1230/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35598
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njee-wqeh-dyf1
57
url VCID-nprc-6br4-gfdj
vulnerability_id VCID-nprc-6br4-gfdj
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2481
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.7138
published_at 2026-04-07T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71388
published_at 2026-04-02T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71453
published_at 2026-04-21T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71406
published_at 2026-04-04T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71421
published_at 2026-04-08T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71433
published_at 2026-04-09T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71456
published_at 2026-04-11T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.7144
published_at 2026-04-12T12:55:00Z
8
value 0.00674
scoring_system epss
scoring_elements 0.71422
published_at 2026-04-13T12:55:00Z
9
value 0.00674
scoring_system epss
scoring_elements 0.71468
published_at 2026-04-16T12:55:00Z
10
value 0.00674
scoring_system epss
scoring_elements 0.71473
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2481
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016091
reference_id 2016091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016091
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2481
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nprc-6br4-gfdj
58
url VCID-p559-ueva-ffgv
vulnerability_id VCID-p559-ueva-ffgv
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2196
reference_id
reference_type
scores
0
value 0.01233
scoring_system epss
scoring_elements 0.79134
published_at 2026-04-01T12:55:00Z
1
value 0.01233
scoring_system epss
scoring_elements 0.7914
published_at 2026-04-02T12:55:00Z
2
value 0.01233
scoring_system epss
scoring_elements 0.79208
published_at 2026-04-21T12:55:00Z
3
value 0.01233
scoring_system epss
scoring_elements 0.79165
published_at 2026-04-04T12:55:00Z
4
value 0.01233
scoring_system epss
scoring_elements 0.79151
published_at 2026-04-07T12:55:00Z
5
value 0.01233
scoring_system epss
scoring_elements 0.79176
published_at 2026-04-08T12:55:00Z
6
value 0.01233
scoring_system epss
scoring_elements 0.79184
published_at 2026-04-09T12:55:00Z
7
value 0.01233
scoring_system epss
scoring_elements 0.79209
published_at 2026-04-11T12:55:00Z
8
value 0.01233
scoring_system epss
scoring_elements 0.79194
published_at 2026-04-12T12:55:00Z
9
value 0.01233
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-13T12:55:00Z
10
value 0.01233
scoring_system epss
scoring_elements 0.79211
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2196
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951765
reference_id 1951765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951765
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
9
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2196
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p559-ueva-ffgv
59
url VCID-p6g6-hqgv-vuce
vulnerability_id VCID-p6g6-hqgv-vuce
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2299
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54194
published_at 2026-04-01T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54214
published_at 2026-04-02T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54302
published_at 2026-04-21T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54317
published_at 2026-04-16T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54299
published_at 2026-04-12T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54278
published_at 2026-04-13T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54322
published_at 2026-04-18T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-04T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-07T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-08T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2299
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951780
reference_id 1951780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951780
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2299
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p6g6-hqgv-vuce
60
url VCID-pez6-qjvg-jke6
vulnerability_id VCID-pez6-qjvg-jke6
summary Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35621
reference_id
reference_type
scores
0
value 0.06237
scoring_system epss
scoring_elements 0.90917
published_at 2026-04-21T12:55:00Z
1
value 0.06237
scoring_system epss
scoring_elements 0.90848
published_at 2026-04-02T12:55:00Z
2
value 0.06237
scoring_system epss
scoring_elements 0.9088
published_at 2026-04-08T12:55:00Z
3
value 0.06237
scoring_system epss
scoring_elements 0.90887
published_at 2026-04-09T12:55:00Z
4
value 0.06237
scoring_system epss
scoring_elements 0.90896
published_at 2026-04-12T12:55:00Z
5
value 0.06237
scoring_system epss
scoring_elements 0.90895
published_at 2026-04-13T12:55:00Z
6
value 0.06237
scoring_system epss
scoring_elements 0.9092
published_at 2026-04-16T12:55:00Z
7
value 0.06237
scoring_system epss
scoring_elements 0.90842
published_at 2026-04-01T12:55:00Z
8
value 0.06237
scoring_system epss
scoring_elements 0.90858
published_at 2026-04-04T12:55:00Z
9
value 0.06237
scoring_system epss
scoring_elements 0.90869
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35621
1
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:45Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-1232/
reference_id ZDI-21-1232
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:45Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-1232/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35621
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pez6-qjvg-jke6
61
url VCID-pq5z-fp69-sufy
vulnerability_id VCID-pq5z-fp69-sufy
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35608
reference_id
reference_type
scores
0
value 0.00359
scoring_system epss
scoring_elements 0.57978
published_at 2026-04-01T12:55:00Z
1
value 0.00359
scoring_system epss
scoring_elements 0.58062
published_at 2026-04-02T12:55:00Z
2
value 0.00359
scoring_system epss
scoring_elements 0.58097
published_at 2026-04-21T12:55:00Z
3
value 0.00359
scoring_system epss
scoring_elements 0.58084
published_at 2026-04-04T12:55:00Z
4
value 0.00359
scoring_system epss
scoring_elements 0.58059
published_at 2026-04-07T12:55:00Z
5
value 0.00359
scoring_system epss
scoring_elements 0.58113
published_at 2026-04-08T12:55:00Z
6
value 0.00359
scoring_system epss
scoring_elements 0.58117
published_at 2026-04-09T12:55:00Z
7
value 0.00359
scoring_system epss
scoring_elements 0.58133
published_at 2026-04-11T12:55:00Z
8
value 0.00359
scoring_system epss
scoring_elements 0.5811
published_at 2026-04-12T12:55:00Z
9
value 0.00359
scoring_system epss
scoring_elements 0.5809
published_at 2026-04-13T12:55:00Z
10
value 0.00359
scoring_system epss
scoring_elements 0.58121
published_at 2026-04-16T12:55:00Z
11
value 0.00359
scoring_system epss
scoring_elements 0.58122
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35608
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016105
reference_id 2016105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016105
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35608
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pq5z-fp69-sufy
62
url VCID-pw3f-uc38-5qcb
vulnerability_id VCID-pw3f-uc38-5qcb
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35622
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.4588
published_at 2026-04-01T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45927
published_at 2026-04-02T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45998
published_at 2026-04-18T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45972
published_at 2026-04-11T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45944
published_at 2026-04-21T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.45951
published_at 2026-04-13T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.46003
published_at 2026-04-16T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45948
published_at 2026-04-04T12:55:00Z
8
value 0.00231
scoring_system epss
scoring_elements 0.45896
published_at 2026-04-07T12:55:00Z
9
value 0.00231
scoring_system epss
scoring_elements 0.45952
published_at 2026-04-08T12:55:00Z
10
value 0.00231
scoring_system epss
scoring_elements 0.45949
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35622
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016108
reference_id 2016108
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016108
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:27Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35622
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pw3f-uc38-5qcb
63
url VCID-q2q2-ubam-fbh9
vulnerability_id VCID-q2q2-ubam-fbh9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35577
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-01T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.54016
published_at 2026-04-02T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54106
published_at 2026-04-21T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.54042
published_at 2026-04-04T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54019
published_at 2026-04-07T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.5407
published_at 2026-04-09T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54117
published_at 2026-04-11T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54099
published_at 2026-04-12T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54082
published_at 2026-04-13T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.54121
published_at 2026-04-16T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.54125
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35577
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016095
reference_id 2016095
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016095
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35577
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q2q2-ubam-fbh9
64
url VCID-qbyx-gq4t-rkhd
vulnerability_id VCID-qbyx-gq4t-rkhd
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2478
reference_id
reference_type
scores
0
value 0.0042
scoring_system epss
scoring_elements 0.61805
published_at 2026-04-01T12:55:00Z
1
value 0.0042
scoring_system epss
scoring_elements 0.61879
published_at 2026-04-02T12:55:00Z
2
value 0.0042
scoring_system epss
scoring_elements 0.61965
published_at 2026-04-21T12:55:00Z
3
value 0.0042
scoring_system epss
scoring_elements 0.6191
published_at 2026-04-04T12:55:00Z
4
value 0.0042
scoring_system epss
scoring_elements 0.61881
published_at 2026-04-07T12:55:00Z
5
value 0.0042
scoring_system epss
scoring_elements 0.6193
published_at 2026-04-08T12:55:00Z
6
value 0.0042
scoring_system epss
scoring_elements 0.61947
published_at 2026-04-09T12:55:00Z
7
value 0.0042
scoring_system epss
scoring_elements 0.61969
published_at 2026-04-11T12:55:00Z
8
value 0.0042
scoring_system epss
scoring_elements 0.61957
published_at 2026-04-12T12:55:00Z
9
value 0.0042
scoring_system epss
scoring_elements 0.61937
published_at 2026-04-13T12:55:00Z
10
value 0.0042
scoring_system epss
scoring_elements 0.61979
published_at 2026-04-16T12:55:00Z
11
value 0.0042
scoring_system epss
scoring_elements 0.61983
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2478
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016089
reference_id 2016089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016089
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2478
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbyx-gq4t-rkhd
65
url VCID-qqae-rsw8-x7gp
vulnerability_id VCID-qqae-rsw8-x7gp
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2304
reference_id
reference_type
scores
0
value 0.00287
scoring_system epss
scoring_elements 0.52023
published_at 2026-04-01T12:55:00Z
1
value 0.00287
scoring_system epss
scoring_elements 0.52071
published_at 2026-04-02T12:55:00Z
2
value 0.00287
scoring_system epss
scoring_elements 0.52157
published_at 2026-04-21T12:55:00Z
3
value 0.00287
scoring_system epss
scoring_elements 0.52147
published_at 2026-04-12T12:55:00Z
4
value 0.00287
scoring_system epss
scoring_elements 0.52131
published_at 2026-04-13T12:55:00Z
5
value 0.00287
scoring_system epss
scoring_elements 0.52172
published_at 2026-04-16T12:55:00Z
6
value 0.00287
scoring_system epss
scoring_elements 0.52175
published_at 2026-04-18T12:55:00Z
7
value 0.00287
scoring_system epss
scoring_elements 0.52097
published_at 2026-04-04T12:55:00Z
8
value 0.00287
scoring_system epss
scoring_elements 0.52062
published_at 2026-04-07T12:55:00Z
9
value 0.00287
scoring_system epss
scoring_elements 0.52116
published_at 2026-04-08T12:55:00Z
10
value 0.00287
scoring_system epss
scoring_elements 0.52112
published_at 2026-04-09T12:55:00Z
11
value 0.00287
scoring_system epss
scoring_elements 0.52163
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2304
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951783
reference_id 1951783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951783
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2304
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qqae-rsw8-x7gp
66
url VCID-qtjn-m9ak-6ye1
vulnerability_id VCID-qtjn-m9ak-6ye1
summary mysql: Server: Replication unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35546
reference_id
reference_type
scores
0
value 0.00534
scoring_system epss
scoring_elements 0.67326
published_at 2026-04-01T12:55:00Z
1
value 0.00534
scoring_system epss
scoring_elements 0.67362
published_at 2026-04-02T12:55:00Z
2
value 0.00534
scoring_system epss
scoring_elements 0.67429
published_at 2026-04-21T12:55:00Z
3
value 0.00534
scoring_system epss
scoring_elements 0.67385
published_at 2026-04-04T12:55:00Z
4
value 0.00534
scoring_system epss
scoring_elements 0.67363
published_at 2026-04-07T12:55:00Z
5
value 0.00534
scoring_system epss
scoring_elements 0.67415
published_at 2026-04-08T12:55:00Z
6
value 0.00534
scoring_system epss
scoring_elements 0.67428
published_at 2026-04-09T12:55:00Z
7
value 0.00534
scoring_system epss
scoring_elements 0.67449
published_at 2026-04-11T12:55:00Z
8
value 0.00534
scoring_system epss
scoring_elements 0.67437
published_at 2026-04-12T12:55:00Z
9
value 0.00534
scoring_system epss
scoring_elements 0.67403
published_at 2026-04-13T12:55:00Z
10
value 0.00534
scoring_system epss
scoring_elements 0.67439
published_at 2026-04-16T12:55:00Z
11
value 0.00534
scoring_system epss
scoring_elements 0.67451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35546
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016093
reference_id 2016093
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016093
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35546
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtjn-m9ak-6ye1
67
url VCID-qzc8-kgrw-7yg2
vulnerability_id VCID-qzc8-kgrw-7yg2
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35537
reference_id
reference_type
scores
0
value 0.00148
scoring_system epss
scoring_elements 0.35145
published_at 2026-04-01T12:55:00Z
1
value 0.00148
scoring_system epss
scoring_elements 0.35346
published_at 2026-04-02T12:55:00Z
2
value 0.00148
scoring_system epss
scoring_elements 0.35241
published_at 2026-04-21T12:55:00Z
3
value 0.00148
scoring_system epss
scoring_elements 0.3529
published_at 2026-04-12T12:55:00Z
4
value 0.00148
scoring_system epss
scoring_elements 0.35267
published_at 2026-04-13T12:55:00Z
5
value 0.00148
scoring_system epss
scoring_elements 0.35305
published_at 2026-04-16T12:55:00Z
6
value 0.00148
scoring_system epss
scoring_elements 0.35291
published_at 2026-04-18T12:55:00Z
7
value 0.00148
scoring_system epss
scoring_elements 0.35373
published_at 2026-04-04T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35255
published_at 2026-04-07T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35301
published_at 2026-04-08T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.35325
published_at 2026-04-09T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.35327
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35537
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016092
reference_id 2016092
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016092
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:08Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35537
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzc8-kgrw-7yg2
68
url VCID-r4jk-v7qa-nkf9
vulnerability_id VCID-r4jk-v7qa-nkf9
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35639
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34671
published_at 2026-04-01T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34887
published_at 2026-04-02T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34784
published_at 2026-04-21T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34831
published_at 2026-04-12T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34807
published_at 2026-04-13T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34845
published_at 2026-04-16T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34828
published_at 2026-04-18T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34914
published_at 2026-04-04T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34791
published_at 2026-04-07T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34835
published_at 2026-04-08T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34864
published_at 2026-04-09T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35639
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016128
reference_id 2016128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016128
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:10Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35639
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4jk-v7qa-nkf9
69
url VCID-r4wz-4cet-p3ch
vulnerability_id VCID-r4wz-4cet-p3ch
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2213
reference_id
reference_type
scores
0
value 0.00649
scoring_system epss
scoring_elements 0.70736
published_at 2026-04-01T12:55:00Z
1
value 0.00649
scoring_system epss
scoring_elements 0.70751
published_at 2026-04-02T12:55:00Z
2
value 0.00649
scoring_system epss
scoring_elements 0.70826
published_at 2026-04-21T12:55:00Z
3
value 0.00649
scoring_system epss
scoring_elements 0.70812
published_at 2026-04-12T12:55:00Z
4
value 0.00649
scoring_system epss
scoring_elements 0.70797
published_at 2026-04-13T12:55:00Z
5
value 0.00649
scoring_system epss
scoring_elements 0.70842
published_at 2026-04-16T12:55:00Z
6
value 0.00649
scoring_system epss
scoring_elements 0.70848
published_at 2026-04-18T12:55:00Z
7
value 0.00649
scoring_system epss
scoring_elements 0.70769
published_at 2026-04-04T12:55:00Z
8
value 0.00649
scoring_system epss
scoring_elements 0.70745
published_at 2026-04-07T12:55:00Z
9
value 0.00649
scoring_system epss
scoring_elements 0.70789
published_at 2026-04-08T12:55:00Z
10
value 0.00649
scoring_system epss
scoring_elements 0.70805
published_at 2026-04-09T12:55:00Z
11
value 0.00649
scoring_system epss
scoring_elements 0.70828
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2213
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951771
reference_id 1951771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951771
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2213
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4wz-4cet-p3ch
70
url VCID-rhr1-hje4-2qe6
vulnerability_id VCID-rhr1-hje4-2qe6
summary mysql: Server: Options unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35602
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.45062
published_at 2026-04-01T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.45143
published_at 2026-04-02T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45146
published_at 2026-04-21T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45165
published_at 2026-04-04T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45107
published_at 2026-04-07T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.4516
published_at 2026-04-09T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45181
published_at 2026-04-11T12:55:00Z
7
value 0.00224
scoring_system epss
scoring_elements 0.45149
published_at 2026-04-12T12:55:00Z
8
value 0.00224
scoring_system epss
scoring_elements 0.45151
published_at 2026-04-13T12:55:00Z
9
value 0.00224
scoring_system epss
scoring_elements 0.45201
published_at 2026-04-16T12:55:00Z
10
value 0.00224
scoring_system epss
scoring_elements 0.45194
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35602
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016100
reference_id 2016100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016100
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35602
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhr1-hje4-2qe6
71
url VCID-rr3t-1zsh-b7hm
vulnerability_id VCID-rr3t-1zsh-b7hm
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2203
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76812
published_at 2026-04-01T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.7691
published_at 2026-04-21T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-12T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76872
published_at 2026-04-13T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-16T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76919
published_at 2026-04-18T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-04T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-07T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.7686
published_at 2026-04-08T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-09T12:55:00Z
11
value 0.00989
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2203
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951768
reference_id 1951768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951768
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2203
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rr3t-1zsh-b7hm
72
url VCID-suhd-prx3-k7fy
vulnerability_id VCID-suhd-prx3-k7fy
summary mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2301
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.54796
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54866
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.549
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54903
published_at 2026-04-12T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54879
published_at 2026-04-13T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54917
published_at 2026-04-16T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5492
published_at 2026-04-18T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54891
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.5491
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54908
published_at 2026-04-09T12:55:00Z
11
value 0.00318
scoring_system epss
scoring_elements 0.54921
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2301
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951782
reference_id 1951782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951782
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2301
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-suhd-prx3-k7fy
73
url VCID-svv4-xj5y-5uad
vulnerability_id VCID-svv4-xj5y-5uad
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35627
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35627
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016113
reference_id 2016113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016113
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:22Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35627
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svv4-xj5y-5uad
74
url VCID-syty-vyfp-yygc
vulnerability_id VCID-syty-vyfp-yygc
summary mysql: Server: Error Handling unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35596
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-01T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.54016
published_at 2026-04-02T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54106
published_at 2026-04-21T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.54042
published_at 2026-04-04T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54019
published_at 2026-04-07T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.5407
published_at 2026-04-09T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54117
published_at 2026-04-11T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54099
published_at 2026-04-12T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54082
published_at 2026-04-13T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.54121
published_at 2026-04-16T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.54125
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35596
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016098
reference_id 2016098
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016098
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35596
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syty-vyfp-yygc
75
url VCID-t6rb-2f2t-h7g3
vulnerability_id VCID-t6rb-2f2t-h7g3
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2479
reference_id
reference_type
scores
0
value 0.00534
scoring_system epss
scoring_elements 0.67326
published_at 2026-04-01T12:55:00Z
1
value 0.00534
scoring_system epss
scoring_elements 0.67362
published_at 2026-04-02T12:55:00Z
2
value 0.00534
scoring_system epss
scoring_elements 0.67429
published_at 2026-04-21T12:55:00Z
3
value 0.00534
scoring_system epss
scoring_elements 0.67385
published_at 2026-04-04T12:55:00Z
4
value 0.00534
scoring_system epss
scoring_elements 0.67363
published_at 2026-04-07T12:55:00Z
5
value 0.00534
scoring_system epss
scoring_elements 0.67415
published_at 2026-04-08T12:55:00Z
6
value 0.00534
scoring_system epss
scoring_elements 0.67428
published_at 2026-04-09T12:55:00Z
7
value 0.00534
scoring_system epss
scoring_elements 0.67449
published_at 2026-04-11T12:55:00Z
8
value 0.00534
scoring_system epss
scoring_elements 0.67437
published_at 2026-04-12T12:55:00Z
9
value 0.00534
scoring_system epss
scoring_elements 0.67403
published_at 2026-04-13T12:55:00Z
10
value 0.00534
scoring_system epss
scoring_elements 0.67439
published_at 2026-04-16T12:55:00Z
11
value 0.00534
scoring_system epss
scoring_elements 0.67451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2479
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016090
reference_id 2016090
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016090
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2479
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6rb-2f2t-h7g3
76
url VCID-tatx-17xb-1qe1
vulnerability_id VCID-tatx-17xb-1qe1
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35607
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52745
published_at 2026-04-01T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52768
published_at 2026-04-02T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.52853
published_at 2026-04-21T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52795
published_at 2026-04-04T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52762
published_at 2026-04-07T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52813
published_at 2026-04-08T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52807
published_at 2026-04-09T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52858
published_at 2026-04-11T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52841
published_at 2026-04-12T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.52825
published_at 2026-04-13T12:55:00Z
10
value 0.00295
scoring_system epss
scoring_elements 0.52862
published_at 2026-04-16T12:55:00Z
11
value 0.00295
scoring_system epss
scoring_elements 0.52869
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35607
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016104
reference_id 2016104
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016104
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35607
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tatx-17xb-1qe1
77
url VCID-tdsp-tezp-2qhy
vulnerability_id VCID-tdsp-tezp-2qhy
summary mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2202
reference_id
reference_type
scores
0
value 0.01511
scoring_system epss
scoring_elements 0.81135
published_at 2026-04-01T12:55:00Z
1
value 0.01511
scoring_system epss
scoring_elements 0.81144
published_at 2026-04-02T12:55:00Z
2
value 0.01511
scoring_system epss
scoring_elements 0.81237
published_at 2026-04-18T12:55:00Z
3
value 0.01511
scoring_system epss
scoring_elements 0.81219
published_at 2026-04-11T12:55:00Z
4
value 0.01511
scoring_system epss
scoring_elements 0.81205
published_at 2026-04-12T12:55:00Z
5
value 0.01511
scoring_system epss
scoring_elements 0.81198
published_at 2026-04-13T12:55:00Z
6
value 0.01511
scoring_system epss
scoring_elements 0.81235
published_at 2026-04-21T12:55:00Z
7
value 0.01511
scoring_system epss
scoring_elements 0.81167
published_at 2026-04-04T12:55:00Z
8
value 0.01511
scoring_system epss
scoring_elements 0.81166
published_at 2026-04-07T12:55:00Z
9
value 0.01511
scoring_system epss
scoring_elements 0.81194
published_at 2026-04-08T12:55:00Z
10
value 0.01511
scoring_system epss
scoring_elements 0.81199
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2202
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951767
reference_id 1951767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951767
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2202
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tdsp-tezp-2qhy
78
url VCID-twrq-tvwe-xkd1
vulnerability_id VCID-twrq-tvwe-xkd1
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35626
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35626
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016112
reference_id 2016112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016112
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:23Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35626
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twrq-tvwe-xkd1
79
url VCID-u8m3-6w1s-gyca
vulnerability_id VCID-u8m3-6w1s-gyca
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35647
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35647
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016137
reference_id 2016137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016137
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:02Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35647
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u8m3-6w1s-gyca
80
url VCID-unnc-t1ky-c3fx
vulnerability_id VCID-unnc-t1ky-c3fx
summary mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2178
reference_id
reference_type
scores
0
value 0.01365
scoring_system epss
scoring_elements 0.80136
published_at 2026-04-01T12:55:00Z
1
value 0.01365
scoring_system epss
scoring_elements 0.80143
published_at 2026-04-02T12:55:00Z
2
value 0.01365
scoring_system epss
scoring_elements 0.80215
published_at 2026-04-21T12:55:00Z
3
value 0.01365
scoring_system epss
scoring_elements 0.80163
published_at 2026-04-04T12:55:00Z
4
value 0.01365
scoring_system epss
scoring_elements 0.80152
published_at 2026-04-07T12:55:00Z
5
value 0.01365
scoring_system epss
scoring_elements 0.8018
published_at 2026-04-08T12:55:00Z
6
value 0.01365
scoring_system epss
scoring_elements 0.80188
published_at 2026-04-09T12:55:00Z
7
value 0.01365
scoring_system epss
scoring_elements 0.80206
published_at 2026-04-11T12:55:00Z
8
value 0.01365
scoring_system epss
scoring_elements 0.80191
published_at 2026-04-12T12:55:00Z
9
value 0.01365
scoring_system epss
scoring_elements 0.80184
published_at 2026-04-13T12:55:00Z
10
value 0.01365
scoring_system epss
scoring_elements 0.80212
published_at 2026-04-16T12:55:00Z
11
value 0.01365
scoring_system epss
scoring_elements 0.80213
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2178
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951760
reference_id 1951760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951760
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
6
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
7
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2178
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unnc-t1ky-c3fx
81
url VCID-usjz-e1at-vubb
vulnerability_id VCID-usjz-e1at-vubb
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2217
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76812
published_at 2026-04-01T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.7691
published_at 2026-04-21T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-12T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76872
published_at 2026-04-13T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-16T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76919
published_at 2026-04-18T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-04T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-07T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.7686
published_at 2026-04-08T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-09T12:55:00Z
11
value 0.00989
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2217
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951773
reference_id 1951773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951773
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2217
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-usjz-e1at-vubb
82
url VCID-vfxa-abgu-9ydp
vulnerability_id VCID-vfxa-abgu-9ydp
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2305
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54194
published_at 2026-04-01T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54214
published_at 2026-04-02T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54302
published_at 2026-04-21T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54317
published_at 2026-04-16T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54299
published_at 2026-04-12T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54278
published_at 2026-04-13T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54322
published_at 2026-04-18T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-04T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-07T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-08T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2305
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951784
reference_id 1951784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951784
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2305
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vfxa-abgu-9ydp
83
url VCID-wt5d-srfd-3qhc
vulnerability_id VCID-wt5d-srfd-3qhc
summary mysql: C API unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21595
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.34216
published_at 2026-04-02T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.34106
published_at 2026-04-21T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34183
published_at 2026-04-09T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34184
published_at 2026-04-11T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34141
published_at 2026-04-18T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34117
published_at 2026-04-13T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34154
published_at 2026-04-16T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34249
published_at 2026-04-04T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34112
published_at 2026-04-07T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34155
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21595
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142862
reference_id 2142862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142862
4
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:13Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
11
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
12
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2022-21595
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wt5d-srfd-3qhc
84
url VCID-wvxn-ugew-u7bj
vulnerability_id VCID-wvxn-ugew-u7bj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2166
reference_id
reference_type
scores
0
value 0.01154
scoring_system epss
scoring_elements 0.78469
published_at 2026-04-01T12:55:00Z
1
value 0.01154
scoring_system epss
scoring_elements 0.78545
published_at 2026-04-21T12:55:00Z
2
value 0.01154
scoring_system epss
scoring_elements 0.78475
published_at 2026-04-02T12:55:00Z
3
value 0.01154
scoring_system epss
scoring_elements 0.78506
published_at 2026-04-04T12:55:00Z
4
value 0.01154
scoring_system epss
scoring_elements 0.78489
published_at 2026-04-07T12:55:00Z
5
value 0.01154
scoring_system epss
scoring_elements 0.78516
published_at 2026-04-08T12:55:00Z
6
value 0.01154
scoring_system epss
scoring_elements 0.78522
published_at 2026-04-09T12:55:00Z
7
value 0.01154
scoring_system epss
scoring_elements 0.78547
published_at 2026-04-11T12:55:00Z
8
value 0.01154
scoring_system epss
scoring_elements 0.78529
published_at 2026-04-12T12:55:00Z
9
value 0.01154
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-13T12:55:00Z
10
value 0.01154
scoring_system epss
scoring_elements 0.78549
published_at 2026-04-16T12:55:00Z
11
value 0.01154
scoring_system epss
scoring_elements 0.78548
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951755
reference_id 1951755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951755
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
reference_id 988428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
8
reference_url https://security.archlinux.org/ASA-202105-14
reference_id ASA-202105-14
reference_type
scores
url https://security.archlinux.org/ASA-202105-14
9
reference_url https://security.archlinux.org/AVG-1882
reference_id AVG-1882
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1882
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
reference_id DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
reference_id GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
12
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://security.gentoo.org/glsa/202105-27
13
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://security.gentoo.org/glsa/202105-28
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
reference_id PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
19
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
20
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
21
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
22
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
23
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
25
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
26
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2166
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj
85
url VCID-x1ya-zfn1-ebdd
vulnerability_id VCID-x1ya-zfn1-ebdd
summary mysql: Server: FTS unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35648
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35648
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016138
reference_id 2016138
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016138
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:01Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35648
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ya-zfn1-ebdd
86
url VCID-xjhs-6sgc-nfhu
vulnerability_id VCID-xjhs-6sgc-nfhu
summary mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2308
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35439
published_at 2026-04-01T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35638
published_at 2026-04-02T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35537
published_at 2026-04-21T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35579
published_at 2026-04-12T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35556
published_at 2026-04-13T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35596
published_at 2026-04-16T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35586
published_at 2026-04-18T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35663
published_at 2026-04-04T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35544
published_at 2026-04-07T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.3559
published_at 2026-04-08T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35614
published_at 2026-04-09T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.35624
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2308
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951786
reference_id 1951786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951786
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2308
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjhs-6sgc-nfhu
87
url VCID-y3a3-tp5x-nqch
vulnerability_id VCID-y3a3-tp5x-nqch
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2212
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76812
published_at 2026-04-01T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.7691
published_at 2026-04-21T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-12T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76872
published_at 2026-04-13T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-16T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76919
published_at 2026-04-18T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-04T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-07T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.7686
published_at 2026-04-08T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-09T12:55:00Z
11
value 0.00989
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2212
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951770
reference_id 1951770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951770
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2212
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3a3-tp5x-nqch
88
url VCID-yvvh-5fmy-hkau
vulnerability_id VCID-yvvh-5fmy-hkau
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35625
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29549
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29616
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29437
published_at 2026-04-21T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29544
published_at 2026-04-12T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29491
published_at 2026-04-13T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.2951
published_at 2026-04-16T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29483
published_at 2026-04-18T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29665
published_at 2026-04-04T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29486
published_at 2026-04-07T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29587
published_at 2026-04-09T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29589
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35625
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016111
reference_id 2016111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016111
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:24Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-35625
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvvh-5fmy-hkau
89
url VCID-zkmv-3qu7-4kee
vulnerability_id VCID-zkmv-3qu7-4kee
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2230
reference_id
reference_type
scores
0
value 0.00989
scoring_system epss
scoring_elements 0.76812
published_at 2026-04-01T12:55:00Z
1
value 0.00989
scoring_system epss
scoring_elements 0.76819
published_at 2026-04-02T12:55:00Z
2
value 0.00989
scoring_system epss
scoring_elements 0.7691
published_at 2026-04-21T12:55:00Z
3
value 0.00989
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-12T12:55:00Z
4
value 0.00989
scoring_system epss
scoring_elements 0.76872
published_at 2026-04-13T12:55:00Z
5
value 0.00989
scoring_system epss
scoring_elements 0.76914
published_at 2026-04-16T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76919
published_at 2026-04-18T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-04T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-07T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.7686
published_at 2026-04-08T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-09T12:55:00Z
11
value 0.00989
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2230
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951775
reference_id 1951775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951775
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
4
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
5
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
6
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2021-2230
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zkmv-3qu7-4kee
90
url VCID-zt2v-9ka8-g3ff
vulnerability_id VCID-zt2v-9ka8-g3ff
summary mysql: DML unspecified vulnerability (CPU Jul 2025)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50076.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-50076
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29328
published_at 2026-04-02T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29295
published_at 2026-04-09T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29378
published_at 2026-04-04T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.2919
published_at 2026-04-07T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29254
published_at 2026-04-08T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31215
published_at 2026-04-18T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31234
published_at 2026-04-16T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.31188
published_at 2026-04-21T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31287
published_at 2026-04-11T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.31244
published_at 2026-04-12T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31201
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-50076
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2380316
reference_id 2380316
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2380316
3
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:26:39Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
aliases CVE-2025-50076
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zt2v-9ka8-g3ff
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid