Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
Typedeb
Namespacedebian
Namemysql-8.0
Version8.0.29-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.0.30-1
Latest_non_vulnerable_version8.0.46-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-13v8-wt9t-8kcs
vulnerability_id VCID-13v8-wt9t-8kcs
summary mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21362
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48176
published_at 2026-04-24T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
11
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21362
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043641
reference_id 2043641
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043641
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:11Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21362
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13v8-wt9t-8kcs
1
url VCID-2sc2-r3y9-37as
vulnerability_id VCID-2sc2-r3y9-37as
summary mysql: Server: Federated unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2354
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58105
published_at 2026-04-01T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58191
published_at 2026-04-24T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58227
published_at 2026-04-21T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58183
published_at 2026-04-07T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58238
published_at 2026-04-08T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58243
published_at 2026-04-09T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.5826
published_at 2026-04-11T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58237
published_at 2026-04-12T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58218
published_at 2026-04-13T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-16T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58252
published_at 2026-04-18T12:55:00Z
11
value 0.00361
scoring_system epss
scoring_elements 0.58211
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2354
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992298
reference_id 1992298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992298
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2354
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2sc2-r3y9-37as
2
url VCID-2sdk-9wte-n7ct
vulnerability_id VCID-2sdk-9wte-n7ct
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2357
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59643
published_at 2026-04-01T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59716
published_at 2026-04-02T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.5976
published_at 2026-04-24T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59711
published_at 2026-04-07T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59762
published_at 2026-04-13T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59776
published_at 2026-04-09T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.59796
published_at 2026-04-11T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.5978
published_at 2026-04-12T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59799
published_at 2026-04-16T12:55:00Z
9
value 0.00385
scoring_system epss
scoring_elements 0.59806
published_at 2026-04-18T12:55:00Z
10
value 0.00385
scoring_system epss
scoring_elements 0.59789
published_at 2026-04-21T12:55:00Z
11
value 0.00385
scoring_system epss
scoring_elements 0.59741
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2357
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992300
reference_id 1992300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992300
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2357
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2sdk-9wte-n7ct
3
url VCID-31vn-exfm-kuh2
vulnerability_id VCID-31vn-exfm-kuh2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2367
reference_id
reference_type
scores
0
value 0.0044
scoring_system epss
scoring_elements 0.63091
published_at 2026-04-01T12:55:00Z
1
value 0.0044
scoring_system epss
scoring_elements 0.6315
published_at 2026-04-02T12:55:00Z
2
value 0.0044
scoring_system epss
scoring_elements 0.63224
published_at 2026-04-24T12:55:00Z
3
value 0.0044
scoring_system epss
scoring_elements 0.63197
published_at 2026-04-08T12:55:00Z
4
value 0.0044
scoring_system epss
scoring_elements 0.63214
published_at 2026-04-09T12:55:00Z
5
value 0.0044
scoring_system epss
scoring_elements 0.63232
published_at 2026-04-11T12:55:00Z
6
value 0.0044
scoring_system epss
scoring_elements 0.63216
published_at 2026-04-12T12:55:00Z
7
value 0.0044
scoring_system epss
scoring_elements 0.63179
published_at 2026-04-13T12:55:00Z
8
value 0.0044
scoring_system epss
scoring_elements 0.63215
published_at 2026-04-16T12:55:00Z
9
value 0.0044
scoring_system epss
scoring_elements 0.63223
published_at 2026-04-18T12:55:00Z
10
value 0.0044
scoring_system epss
scoring_elements 0.63203
published_at 2026-04-21T12:55:00Z
11
value 0.0044
scoring_system epss
scoring_elements 0.6318
published_at 2026-04-04T12:55:00Z
12
value 0.0044
scoring_system epss
scoring_elements 0.63145
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2367
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992301
reference_id 1992301
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992301
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2367
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-31vn-exfm-kuh2
4
url VCID-39ju-7pvp-hqbv
vulnerability_id VCID-39ju-7pvp-hqbv
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21278
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-02T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62479
published_at 2026-04-24T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62459
published_at 2026-04-12T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62436
published_at 2026-04-13T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.6248
published_at 2026-04-16T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62487
published_at 2026-04-18T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62419
published_at 2026-04-04T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62385
published_at 2026-04-07T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62433
published_at 2026-04-08T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.6245
published_at 2026-04-09T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.62469
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21278
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043628
reference_id 2043628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043628
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:49Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21278
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39ju-7pvp-hqbv
5
url VCID-3wz3-pm9w-vkd7
vulnerability_id VCID-3wz3-pm9w-vkd7
summary mysql: Server: DML unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2370
reference_id
reference_type
scores
0
value 0.0044
scoring_system epss
scoring_elements 0.63091
published_at 2026-04-01T12:55:00Z
1
value 0.0044
scoring_system epss
scoring_elements 0.6315
published_at 2026-04-02T12:55:00Z
2
value 0.0044
scoring_system epss
scoring_elements 0.63224
published_at 2026-04-24T12:55:00Z
3
value 0.0044
scoring_system epss
scoring_elements 0.63197
published_at 2026-04-08T12:55:00Z
4
value 0.0044
scoring_system epss
scoring_elements 0.63214
published_at 2026-04-09T12:55:00Z
5
value 0.0044
scoring_system epss
scoring_elements 0.63232
published_at 2026-04-11T12:55:00Z
6
value 0.0044
scoring_system epss
scoring_elements 0.63216
published_at 2026-04-12T12:55:00Z
7
value 0.0044
scoring_system epss
scoring_elements 0.63179
published_at 2026-04-13T12:55:00Z
8
value 0.0044
scoring_system epss
scoring_elements 0.63215
published_at 2026-04-16T12:55:00Z
9
value 0.0044
scoring_system epss
scoring_elements 0.63223
published_at 2026-04-18T12:55:00Z
10
value 0.0044
scoring_system epss
scoring_elements 0.63203
published_at 2026-04-21T12:55:00Z
11
value 0.0044
scoring_system epss
scoring_elements 0.6318
published_at 2026-04-04T12:55:00Z
12
value 0.0044
scoring_system epss
scoring_elements 0.63145
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2370
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992302
reference_id 1992302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992302
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2370
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wz3-pm9w-vkd7
6
url VCID-3ye4-pp2j-nkcy
vulnerability_id VCID-3ye4-pp2j-nkcy
summary mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2399
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2399
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992311
reference_id 1992311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992311
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2399
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ye4-pp2j-nkcy
7
url VCID-3zjk-18aa-9kbk
vulnerability_id VCID-3zjk-18aa-9kbk
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21413
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54214
published_at 2026-04-02T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54265
published_at 2026-04-24T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54299
published_at 2026-04-12T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54278
published_at 2026-04-13T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54322
published_at 2026-04-18T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54302
published_at 2026-04-21T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-04T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-07T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-08T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-09T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54317
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21413
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082637
reference_id 2082637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082637
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:40Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21413
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3zjk-18aa-9kbk
8
url VCID-4dc2-2bx4-uke7
vulnerability_id VCID-4dc2-2bx4-uke7
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21303
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-02T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51293
published_at 2026-04-24T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51311
published_at 2026-04-08T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51308
published_at 2026-04-09T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51351
published_at 2026-04-11T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51331
published_at 2026-04-12T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-13T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51359
published_at 2026-04-16T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-18T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51346
published_at 2026-04-21T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-04T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51256
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21303
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043632
reference_id 2043632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043632
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
9
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21303
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4dc2-2bx4-uke7
9
url VCID-5hjy-fmy7-cyac
vulnerability_id VCID-5hjy-fmy7-cyac
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2427
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54194
published_at 2026-04-01T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54214
published_at 2026-04-02T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54265
published_at 2026-04-24T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54299
published_at 2026-04-12T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54278
published_at 2026-04-13T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54322
published_at 2026-04-18T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54302
published_at 2026-04-21T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-04T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-07T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-08T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-09T12:55:00Z
11
value 0.00311
scoring_system epss
scoring_elements 0.54317
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2427
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992321
reference_id 1992321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992321
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2427
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjy-fmy7-cyac
10
url VCID-5msw-bc1r-23e7
vulnerability_id VCID-5msw-bc1r-23e7
summary mysql: Server: PS unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2422
reference_id
reference_type
scores
0
value 0.00193
scoring_system epss
scoring_elements 0.41132
published_at 2026-04-01T12:55:00Z
1
value 0.00193
scoring_system epss
scoring_elements 0.41224
published_at 2026-04-02T12:55:00Z
2
value 0.00193
scoring_system epss
scoring_elements 0.41042
published_at 2026-04-24T12:55:00Z
3
value 0.00193
scoring_system epss
scoring_elements 0.41227
published_at 2026-04-18T12:55:00Z
4
value 0.00193
scoring_system epss
scoring_elements 0.41213
published_at 2026-04-13T12:55:00Z
5
value 0.00193
scoring_system epss
scoring_elements 0.41256
published_at 2026-04-16T12:55:00Z
6
value 0.00193
scoring_system epss
scoring_elements 0.41153
published_at 2026-04-21T12:55:00Z
7
value 0.00193
scoring_system epss
scoring_elements 0.41253
published_at 2026-04-04T12:55:00Z
8
value 0.00193
scoring_system epss
scoring_elements 0.4118
published_at 2026-04-07T12:55:00Z
9
value 0.00193
scoring_system epss
scoring_elements 0.41228
published_at 2026-04-08T12:55:00Z
10
value 0.00193
scoring_system epss
scoring_elements 0.41236
published_at 2026-04-09T12:55:00Z
11
value 0.00193
scoring_system epss
scoring_elements 0.41258
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2422
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992317
reference_id 1992317
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992317
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2422
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5msw-bc1r-23e7
11
url VCID-5ufm-419u-2qg3
vulnerability_id VCID-5ufm-419u-2qg3
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21351
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-02T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62479
published_at 2026-04-24T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62459
published_at 2026-04-12T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62436
published_at 2026-04-13T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.6248
published_at 2026-04-16T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62487
published_at 2026-04-18T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62419
published_at 2026-04-04T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62385
published_at 2026-04-07T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62433
published_at 2026-04-08T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.6245
published_at 2026-04-09T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.62469
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21351
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043638
reference_id 2043638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043638
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:20Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21351
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ufm-419u-2qg3
12
url VCID-6674-4tmg-1qbg
vulnerability_id VCID-6674-4tmg-1qbg
summary mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2339
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41316
published_at 2026-04-01T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41408
published_at 2026-04-02T12:55:00Z
2
value 0.00195
scoring_system epss
scoring_elements 0.41436
published_at 2026-04-04T12:55:00Z
3
value 0.00195
scoring_system epss
scoring_elements 0.41363
published_at 2026-04-07T12:55:00Z
4
value 0.00195
scoring_system epss
scoring_elements 0.41413
published_at 2026-04-08T12:55:00Z
5
value 0.00195
scoring_system epss
scoring_elements 0.41422
published_at 2026-04-09T12:55:00Z
6
value 0.00195
scoring_system epss
scoring_elements 0.41442
published_at 2026-04-11T12:55:00Z
7
value 0.00195
scoring_system epss
scoring_elements 0.4141
published_at 2026-04-18T12:55:00Z
8
value 0.00195
scoring_system epss
scoring_elements 0.41395
published_at 2026-04-13T12:55:00Z
9
value 0.00195
scoring_system epss
scoring_elements 0.41439
published_at 2026-04-16T12:55:00Z
10
value 0.00195
scoring_system epss
scoring_elements 0.41337
published_at 2026-04-21T12:55:00Z
11
value 0.00195
scoring_system epss
scoring_elements 0.41228
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2339
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992280
reference_id 1992280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992280
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2339
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6674-4tmg-1qbg
13
url VCID-68eb-ae7g-tbcj
vulnerability_id VCID-68eb-ae7g-tbcj
summary mysql: Server: Parser unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21304
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-02T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51293
published_at 2026-04-24T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51311
published_at 2026-04-08T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51308
published_at 2026-04-09T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51351
published_at 2026-04-11T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51331
published_at 2026-04-12T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-13T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51359
published_at 2026-04-16T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-18T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51346
published_at 2026-04-21T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-04T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51256
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21304
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043633
reference_id 2043633
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043633
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
9
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21304
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68eb-ae7g-tbcj
14
url VCID-6u9x-qcnt-cqc8
vulnerability_id VCID-6u9x-qcnt-cqc8
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2383
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54814
published_at 2026-04-01T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54885
published_at 2026-04-02T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54895
published_at 2026-04-24T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.5488
published_at 2026-04-07T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.5493
published_at 2026-04-08T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54929
published_at 2026-04-09T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54941
published_at 2026-04-18T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54923
published_at 2026-04-12T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.549
published_at 2026-04-13T12:55:00Z
9
value 0.00319
scoring_system epss
scoring_elements 0.54938
published_at 2026-04-16T12:55:00Z
10
value 0.00319
scoring_system epss
scoring_elements 0.5492
published_at 2026-04-21T12:55:00Z
11
value 0.00319
scoring_system epss
scoring_elements 0.54911
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2383
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992305
reference_id 1992305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992305
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2383
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6u9x-qcnt-cqc8
15
url VCID-6ufw-3gfn-5ygm
vulnerability_id VCID-6ufw-3gfn-5ygm
summary mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21605
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66835
published_at 2026-04-02T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66923
published_at 2026-04-24T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66869
published_at 2026-04-13T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66902
published_at 2026-04-16T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66917
published_at 2026-04-18T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66899
published_at 2026-04-21T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.66861
published_at 2026-04-04T12:55:00Z
7
value 0.00522
scoring_system epss
scoring_elements 0.66833
published_at 2026-04-07T12:55:00Z
8
value 0.00522
scoring_system epss
scoring_elements 0.66882
published_at 2026-04-08T12:55:00Z
9
value 0.00522
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-09T12:55:00Z
10
value 0.00522
scoring_system epss
scoring_elements 0.66915
published_at 2026-04-11T12:55:00Z
11
value 0.00522
scoring_system epss
scoring_elements 0.66901
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21605
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142866
reference_id 2142866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142866
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:10Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21605
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ufw-3gfn-5ygm
16
url VCID-7g35-wex8-dygz
vulnerability_id VCID-7g35-wex8-dygz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21866
reference_id
reference_type
scores
0
value 0.00436
scoring_system epss
scoring_elements 0.6299
published_at 2026-04-04T12:55:00Z
1
value 0.00436
scoring_system epss
scoring_elements 0.62962
published_at 2026-04-02T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65122
published_at 2026-04-24T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65121
published_at 2026-04-18T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.65105
published_at 2026-04-21T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65033
published_at 2026-04-07T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65082
published_at 2026-04-08T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65096
published_at 2026-04-09T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65114
published_at 2026-04-11T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65104
published_at 2026-04-12T12:55:00Z
10
value 0.0048
scoring_system epss
scoring_elements 0.65076
published_at 2026-04-13T12:55:00Z
11
value 0.0048
scoring_system epss
scoring_elements 0.65112
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21866
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162273
reference_id 2162273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162273
3
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
4
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21866
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7g35-wex8-dygz
17
url VCID-7r77-wwtj-bbgs
vulnerability_id VCID-7r77-wwtj-bbgs
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21417
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59305
published_at 2026-04-02T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59339
published_at 2026-04-24T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59341
published_at 2026-04-13T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59374
published_at 2026-04-16T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.5938
published_at 2026-04-18T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59361
published_at 2026-04-21T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59328
published_at 2026-04-04T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59293
published_at 2026-04-07T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-08T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59356
published_at 2026-04-09T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59376
published_at 2026-04-11T12:55:00Z
11
value 0.00378
scoring_system epss
scoring_elements 0.59359
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21417
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082640
reference_id 2082640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082640
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:37Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
8
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21417
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7r77-wwtj-bbgs
18
url VCID-82ep-d3fc-dbc2
vulnerability_id VCID-82ep-d3fc-dbc2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2410
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2410
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992313
reference_id 1992313
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992313
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2410
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-82ep-d3fc-dbc2
19
url VCID-8fkf-84dd-7ya2
vulnerability_id VCID-8fkf-84dd-7ya2
summary mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21457
reference_id
reference_type
scores
0
value 0.01859
scoring_system epss
scoring_elements 0.82994
published_at 2026-04-02T12:55:00Z
1
value 0.01859
scoring_system epss
scoring_elements 0.83106
published_at 2026-04-24T12:55:00Z
2
value 0.01859
scoring_system epss
scoring_elements 0.83046
published_at 2026-04-12T12:55:00Z
3
value 0.01859
scoring_system epss
scoring_elements 0.83041
published_at 2026-04-13T12:55:00Z
4
value 0.01859
scoring_system epss
scoring_elements 0.8308
published_at 2026-04-18T12:55:00Z
5
value 0.01859
scoring_system epss
scoring_elements 0.83083
published_at 2026-04-21T12:55:00Z
6
value 0.01859
scoring_system epss
scoring_elements 0.83007
published_at 2026-04-04T12:55:00Z
7
value 0.01859
scoring_system epss
scoring_elements 0.83004
published_at 2026-04-07T12:55:00Z
8
value 0.01859
scoring_system epss
scoring_elements 0.83029
published_at 2026-04-08T12:55:00Z
9
value 0.01859
scoring_system epss
scoring_elements 0.83036
published_at 2026-04-09T12:55:00Z
10
value 0.01859
scoring_system epss
scoring_elements 0.83052
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21457
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082654
reference_id 2082654
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082654
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:03Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21457
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkf-84dd-7ya2
20
url VCID-8mnm-4cgf-2bbt
vulnerability_id VCID-8mnm-4cgf-2bbt
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21302
reference_id
reference_type
scores
0
value 0.00446
scoring_system epss
scoring_elements 0.63449
published_at 2026-04-02T12:55:00Z
1
value 0.00446
scoring_system epss
scoring_elements 0.63525
published_at 2026-04-24T12:55:00Z
2
value 0.00446
scoring_system epss
scoring_elements 0.63492
published_at 2026-04-08T12:55:00Z
3
value 0.00446
scoring_system epss
scoring_elements 0.6351
published_at 2026-04-09T12:55:00Z
4
value 0.00446
scoring_system epss
scoring_elements 0.63527
published_at 2026-04-11T12:55:00Z
5
value 0.00446
scoring_system epss
scoring_elements 0.63511
published_at 2026-04-12T12:55:00Z
6
value 0.00446
scoring_system epss
scoring_elements 0.63477
published_at 2026-04-13T12:55:00Z
7
value 0.00446
scoring_system epss
scoring_elements 0.63513
published_at 2026-04-16T12:55:00Z
8
value 0.00446
scoring_system epss
scoring_elements 0.6352
published_at 2026-04-18T12:55:00Z
9
value 0.00446
scoring_system epss
scoring_elements 0.63506
published_at 2026-04-21T12:55:00Z
10
value 0.00446
scoring_system epss
scoring_elements 0.63476
published_at 2026-04-04T12:55:00Z
11
value 0.00446
scoring_system epss
scoring_elements 0.63441
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21302
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043631
reference_id 2043631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043631
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21302
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8mnm-4cgf-2bbt
21
url VCID-8t59-zf4q-afgb
vulnerability_id VCID-8t59-zf4q-afgb
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21436
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-02T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57491
published_at 2026-04-24T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-12T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57529
published_at 2026-04-13T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-16T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57532
published_at 2026-04-21T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57523
published_at 2026-04-04T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-07T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57552
published_at 2026-04-18T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-09T12:55:00Z
10
value 0.00351
scoring_system epss
scoring_elements 0.57571
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21436
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082646
reference_id 2082646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082646
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:20Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21436
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8t59-zf4q-afgb
22
url VCID-9851-8zjc-zfgf
vulnerability_id VCID-9851-8zjc-zfgf
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21435
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45297
published_at 2026-04-02T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45214
published_at 2026-04-24T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45307
published_at 2026-04-13T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45358
published_at 2026-04-16T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45353
published_at 2026-04-18T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45302
published_at 2026-04-21T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45319
published_at 2026-04-04T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45261
published_at 2026-04-07T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45317
published_at 2026-04-08T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45316
published_at 2026-04-09T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.45337
published_at 2026-04-11T12:55:00Z
11
value 0.00225
scoring_system epss
scoring_elements 0.45305
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21435
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082645
reference_id 2082645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082645
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:21Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21435
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9851-8zjc-zfgf
23
url VCID-9fvk-eqmz-zfcz
vulnerability_id VCID-9fvk-eqmz-zfcz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21414
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-02T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57491
published_at 2026-04-24T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-12T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57529
published_at 2026-04-13T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-16T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57532
published_at 2026-04-21T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57523
published_at 2026-04-04T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-07T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57552
published_at 2026-04-18T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-09T12:55:00Z
10
value 0.00351
scoring_system epss
scoring_elements 0.57571
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21414
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082638
reference_id 2082638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082638
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:39Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21414
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fvk-eqmz-zfcz
24
url VCID-9su2-mawm-8ued
vulnerability_id VCID-9su2-mawm-8ued
summary mysql: Server: Federated unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21270
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-02T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51293
published_at 2026-04-24T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51311
published_at 2026-04-08T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51308
published_at 2026-04-09T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51351
published_at 2026-04-11T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51331
published_at 2026-04-12T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-13T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51359
published_at 2026-04-16T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-18T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51346
published_at 2026-04-21T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-04T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51256
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21270
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043627
reference_id 2043627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043627
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
9
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21270
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9su2-mawm-8ued
25
url VCID-b4wd-75p9-bqgh
vulnerability_id VCID-b4wd-75p9-bqgh
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2384
reference_id
reference_type
scores
0
value 0.0044
scoring_system epss
scoring_elements 0.63091
published_at 2026-04-01T12:55:00Z
1
value 0.0044
scoring_system epss
scoring_elements 0.6315
published_at 2026-04-02T12:55:00Z
2
value 0.0044
scoring_system epss
scoring_elements 0.63224
published_at 2026-04-24T12:55:00Z
3
value 0.0044
scoring_system epss
scoring_elements 0.63197
published_at 2026-04-08T12:55:00Z
4
value 0.0044
scoring_system epss
scoring_elements 0.63214
published_at 2026-04-09T12:55:00Z
5
value 0.0044
scoring_system epss
scoring_elements 0.63232
published_at 2026-04-11T12:55:00Z
6
value 0.0044
scoring_system epss
scoring_elements 0.63216
published_at 2026-04-12T12:55:00Z
7
value 0.0044
scoring_system epss
scoring_elements 0.63179
published_at 2026-04-13T12:55:00Z
8
value 0.0044
scoring_system epss
scoring_elements 0.63215
published_at 2026-04-16T12:55:00Z
9
value 0.0044
scoring_system epss
scoring_elements 0.63223
published_at 2026-04-18T12:55:00Z
10
value 0.0044
scoring_system epss
scoring_elements 0.63203
published_at 2026-04-21T12:55:00Z
11
value 0.0044
scoring_system epss
scoring_elements 0.6318
published_at 2026-04-04T12:55:00Z
12
value 0.0044
scoring_system epss
scoring_elements 0.63145
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2384
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992306
reference_id 1992306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992306
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2384
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4wd-75p9-bqgh
26
url VCID-bf13-qnc8-gkeh
vulnerability_id VCID-bf13-qnc8-gkeh
summary mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21374
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48176
published_at 2026-04-24T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
11
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21374
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043646
reference_id 2043646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043646
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:05Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21374
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bf13-qnc8-gkeh
27
url VCID-bg43-1ngx-17cb
vulnerability_id VCID-bg43-1ngx-17cb
summary mysql: Server: DML unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2440
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34671
published_at 2026-04-01T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34887
published_at 2026-04-02T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34547
published_at 2026-04-24T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34807
published_at 2026-04-13T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34845
published_at 2026-04-16T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34828
published_at 2026-04-18T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34784
published_at 2026-04-21T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34914
published_at 2026-04-04T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34791
published_at 2026-04-07T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34835
published_at 2026-04-08T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34864
published_at 2026-04-09T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-11T12:55:00Z
12
value 0.00145
scoring_system epss
scoring_elements 0.34831
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2440
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992324
reference_id 1992324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992324
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2440
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bg43-1ngx-17cb
28
url VCID-byam-rx6m-3yab
vulnerability_id VCID-byam-rx6m-3yab
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2441
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2441
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992325
reference_id 1992325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992325
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2441
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byam-rx6m-3yab
29
url VCID-c5u7-hdrq-2qcm
vulnerability_id VCID-c5u7-hdrq-2qcm
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2429
reference_id
reference_type
scores
0
value 0.05389
scoring_system epss
scoring_elements 0.90078
published_at 2026-04-01T12:55:00Z
1
value 0.05389
scoring_system epss
scoring_elements 0.9008
published_at 2026-04-02T12:55:00Z
2
value 0.05389
scoring_system epss
scoring_elements 0.90149
published_at 2026-04-24T12:55:00Z
3
value 0.05389
scoring_system epss
scoring_elements 0.90118
published_at 2026-04-09T12:55:00Z
4
value 0.05389
scoring_system epss
scoring_elements 0.90127
published_at 2026-04-11T12:55:00Z
5
value 0.05389
scoring_system epss
scoring_elements 0.90125
published_at 2026-04-12T12:55:00Z
6
value 0.05389
scoring_system epss
scoring_elements 0.9012
published_at 2026-04-13T12:55:00Z
7
value 0.05389
scoring_system epss
scoring_elements 0.90137
published_at 2026-04-18T12:55:00Z
8
value 0.05389
scoring_system epss
scoring_elements 0.90134
published_at 2026-04-21T12:55:00Z
9
value 0.05389
scoring_system epss
scoring_elements 0.90092
published_at 2026-04-04T12:55:00Z
10
value 0.05389
scoring_system epss
scoring_elements 0.90096
published_at 2026-04-07T12:55:00Z
11
value 0.05389
scoring_system epss
scoring_elements 0.90112
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2429
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992322
reference_id 1992322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992322
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-889/
reference_id ZDI-21-889
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:35Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-889/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2429
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c5u7-hdrq-2qcm
30
url VCID-cesc-kr1b-cugn
vulnerability_id VCID-cesc-kr1b-cugn
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21452
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-02T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57491
published_at 2026-04-24T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-12T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57529
published_at 2026-04-13T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-16T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57532
published_at 2026-04-21T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57523
published_at 2026-04-04T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-07T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57552
published_at 2026-04-18T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-09T12:55:00Z
10
value 0.00351
scoring_system epss
scoring_elements 0.57571
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21452
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082652
reference_id 2082652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082652
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:08Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21452
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cesc-kr1b-cugn
31
url VCID-ckdu-28ct-2kb7
vulnerability_id VCID-ckdu-28ct-2kb7
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2387
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2387
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992308
reference_id 1992308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992308
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2387
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckdu-28ct-2kb7
32
url VCID-d3c8-yxse-gqa1
vulnerability_id VCID-d3c8-yxse-gqa1
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21372
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32321
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32013
published_at 2026-04-24T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32191
published_at 2026-04-13T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32225
published_at 2026-04-16T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32203
published_at 2026-04-18T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32175
published_at 2026-04-21T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32359
published_at 2026-04-04T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32183
published_at 2026-04-07T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32231
published_at 2026-04-08T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32259
published_at 2026-04-09T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.3226
published_at 2026-04-11T12:55:00Z
11
value 0.00128
scoring_system epss
scoring_elements 0.32222
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21372
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043645
reference_id 2043645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043645
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:07Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21372
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d3c8-yxse-gqa1
33
url VCID-dbat-jj2y-sqbw
vulnerability_id VCID-dbat-jj2y-sqbw
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21425
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.598
published_at 2026-04-02T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.59875
published_at 2026-04-21T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59864
published_at 2026-04-12T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59845
published_at 2026-04-13T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.59883
published_at 2026-04-16T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.5989
published_at 2026-04-18T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59824
published_at 2026-04-04T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59795
published_at 2026-04-07T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59846
published_at 2026-04-24T12:55:00Z
9
value 0.00387
scoring_system epss
scoring_elements 0.59859
published_at 2026-04-09T12:55:00Z
10
value 0.00387
scoring_system epss
scoring_elements 0.5988
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21425
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082643
reference_id 2082643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082643
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:33Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21425
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dbat-jj2y-sqbw
34
url VCID-dwdy-u6t6-d7d3
vulnerability_id VCID-dwdy-u6t6-d7d3
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2437
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2437
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992323
reference_id 1992323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992323
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2437
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwdy-u6t6-d7d3
35
url VCID-e33p-spt4-33bn
vulnerability_id VCID-e33p-spt4-33bn
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21438
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-02T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57491
published_at 2026-04-24T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-12T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57529
published_at 2026-04-13T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-16T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57532
published_at 2026-04-21T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57523
published_at 2026-04-04T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-07T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57552
published_at 2026-04-18T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-09T12:55:00Z
10
value 0.00351
scoring_system epss
scoring_elements 0.57571
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21438
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082648
reference_id 2082648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082648
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:17Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21438
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e33p-spt4-33bn
36
url VCID-e8ge-ejs7-7ben
vulnerability_id VCID-e8ge-ejs7-7ben
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21297
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-02T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39424
published_at 2026-04-24T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39666
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39716
published_at 2026-04-16T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-18T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39603
published_at 2026-04-21T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39722
published_at 2026-04-04T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.3964
published_at 2026-04-07T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39694
published_at 2026-04-08T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39709
published_at 2026-04-09T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39718
published_at 2026-04-11T12:55:00Z
11
value 0.0018
scoring_system epss
scoring_elements 0.39682
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21297
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043629
reference_id 2043629
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043629
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:46Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21297
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ge-ejs7-7ben
37
url VCID-e8ty-bkjz-5bh4
vulnerability_id VCID-e8ty-bkjz-5bh4
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2390
reference_id
reference_type
scores
0
value 0.02184
scoring_system epss
scoring_elements 0.84294
published_at 2026-04-01T12:55:00Z
1
value 0.02184
scoring_system epss
scoring_elements 0.84307
published_at 2026-04-02T12:55:00Z
2
value 0.02184
scoring_system epss
scoring_elements 0.84414
published_at 2026-04-24T12:55:00Z
3
value 0.02184
scoring_system epss
scoring_elements 0.84374
published_at 2026-04-11T12:55:00Z
4
value 0.02184
scoring_system epss
scoring_elements 0.84367
published_at 2026-04-12T12:55:00Z
5
value 0.02184
scoring_system epss
scoring_elements 0.84363
published_at 2026-04-13T12:55:00Z
6
value 0.02184
scoring_system epss
scoring_elements 0.84385
published_at 2026-04-16T12:55:00Z
7
value 0.02184
scoring_system epss
scoring_elements 0.84386
published_at 2026-04-18T12:55:00Z
8
value 0.02184
scoring_system epss
scoring_elements 0.84388
published_at 2026-04-21T12:55:00Z
9
value 0.02184
scoring_system epss
scoring_elements 0.84327
published_at 2026-04-04T12:55:00Z
10
value 0.02184
scoring_system epss
scoring_elements 0.84329
published_at 2026-04-07T12:55:00Z
11
value 0.02184
scoring_system epss
scoring_elements 0.8435
published_at 2026-04-08T12:55:00Z
12
value 0.02184
scoring_system epss
scoring_elements 0.84356
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2390
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992310
reference_id 1992310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992310
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
6
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
7
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-881/
reference_id ZDI-21-881
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:17Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-881/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2390
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ty-bkjz-5bh4
38
url VCID-esze-5kfz-sfea
vulnerability_id VCID-esze-5kfz-sfea
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21478
reference_id
reference_type
scores
0
value 0.00331
scoring_system epss
scoring_elements 0.56034
published_at 2026-04-02T12:55:00Z
1
value 0.00331
scoring_system epss
scoring_elements 0.55993
published_at 2026-04-24T12:55:00Z
2
value 0.00331
scoring_system epss
scoring_elements 0.56059
published_at 2026-04-13T12:55:00Z
3
value 0.00331
scoring_system epss
scoring_elements 0.56093
published_at 2026-04-16T12:55:00Z
4
value 0.00331
scoring_system epss
scoring_elements 0.56096
published_at 2026-04-18T12:55:00Z
5
value 0.00331
scoring_system epss
scoring_elements 0.56067
published_at 2026-04-21T12:55:00Z
6
value 0.00331
scoring_system epss
scoring_elements 0.56054
published_at 2026-04-04T12:55:00Z
7
value 0.00331
scoring_system epss
scoring_elements 0.56033
published_at 2026-04-07T12:55:00Z
8
value 0.00331
scoring_system epss
scoring_elements 0.56084
published_at 2026-04-08T12:55:00Z
9
value 0.00331
scoring_system epss
scoring_elements 0.56087
published_at 2026-04-09T12:55:00Z
10
value 0.00331
scoring_system epss
scoring_elements 0.56099
published_at 2026-04-11T12:55:00Z
11
value 0.00331
scoring_system epss
scoring_elements 0.56076
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21478
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082658
reference_id 2082658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082658
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:46Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21478
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esze-5kfz-sfea
39
url VCID-ezwh-q7de-abey
vulnerability_id VCID-ezwh-q7de-abey
summary mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21427
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22213
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21906
published_at 2026-04-24T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22179
published_at 2026-04-09T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22199
published_at 2026-04-11T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22159
published_at 2026-04-12T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22099
published_at 2026-04-16T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22093
published_at 2026-04-18T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22046
published_at 2026-04-21T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22261
published_at 2026-04-04T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22044
published_at 2026-04-07T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22124
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082644
reference_id 2082644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082644
4
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:32Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
6
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
7
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
8
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
9
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
10
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
11
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21427
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwh-q7de-abey
40
url VCID-f2hn-79mj-fyer
vulnerability_id VCID-f2hn-79mj-fyer
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2356
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47536
published_at 2026-04-01T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47564
published_at 2026-04-02T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47587
published_at 2026-04-24T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47533
published_at 2026-04-07T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47588
published_at 2026-04-08T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47584
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47608
published_at 2026-04-11T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.47592
published_at 2026-04-13T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.4765
published_at 2026-04-16T12:55:00Z
9
value 0.00243
scoring_system epss
scoring_elements 0.47642
published_at 2026-04-18T12:55:00Z
10
value 0.00243
scoring_system epss
scoring_elements 0.47595
published_at 2026-04-21T12:55:00Z
11
value 0.00243
scoring_system epss
scoring_elements 0.47585
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2356
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992299
reference_id 1992299
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992299
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2356
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f2hn-79mj-fyer
41
url VCID-f6px-shha-wqcn
vulnerability_id VCID-f6px-shha-wqcn
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21462
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44345
published_at 2026-04-13T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44234
published_at 2026-04-24T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44346
published_at 2026-04-12T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44401
published_at 2026-04-16T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44391
published_at 2026-04-18T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44321
published_at 2026-04-21T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44367
published_at 2026-04-04T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44304
published_at 2026-04-07T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44355
published_at 2026-04-08T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-09T12:55:00Z
10
value 0.00218
scoring_system epss
scoring_elements 0.44378
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21462
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082657
reference_id 2082657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082657
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:57Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21462
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6px-shha-wqcn
42
url VCID-fjxp-kyqj-7fgp
vulnerability_id VCID-fjxp-kyqj-7fgp
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21423
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54214
published_at 2026-04-02T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54265
published_at 2026-04-24T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54299
published_at 2026-04-12T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54278
published_at 2026-04-13T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54322
published_at 2026-04-18T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54302
published_at 2026-04-21T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-04T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-07T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-08T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-09T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54317
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21423
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082642
reference_id 2082642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082642
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:34Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21423
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fjxp-kyqj-7fgp
43
url VCID-g6f6-1du9-ufhz
vulnerability_id VCID-g6f6-1du9-ufhz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21254
reference_id
reference_type
scores
0
value 0.01135
scoring_system epss
scoring_elements 0.78322
published_at 2026-04-02T12:55:00Z
1
value 0.01135
scoring_system epss
scoring_elements 0.78428
published_at 2026-04-24T12:55:00Z
2
value 0.01135
scoring_system epss
scoring_elements 0.78336
published_at 2026-04-07T12:55:00Z
3
value 0.01135
scoring_system epss
scoring_elements 0.78362
published_at 2026-04-08T12:55:00Z
4
value 0.01135
scoring_system epss
scoring_elements 0.78368
published_at 2026-04-09T12:55:00Z
5
value 0.01135
scoring_system epss
scoring_elements 0.78394
published_at 2026-04-21T12:55:00Z
6
value 0.01135
scoring_system epss
scoring_elements 0.78376
published_at 2026-04-12T12:55:00Z
7
value 0.01135
scoring_system epss
scoring_elements 0.78369
published_at 2026-04-13T12:55:00Z
8
value 0.01135
scoring_system epss
scoring_elements 0.78399
published_at 2026-04-16T12:55:00Z
9
value 0.01135
scoring_system epss
scoring_elements 0.78397
published_at 2026-04-18T12:55:00Z
10
value 0.01135
scoring_system epss
scoring_elements 0.78353
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21254
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043623
reference_id 2043623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043623
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21254
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g6f6-1du9-ufhz
44
url VCID-gm7z-m589-77gy
vulnerability_id VCID-gm7z-m589-77gy
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2426
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54194
published_at 2026-04-01T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54214
published_at 2026-04-02T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54265
published_at 2026-04-24T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54299
published_at 2026-04-12T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54278
published_at 2026-04-13T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54322
published_at 2026-04-18T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54302
published_at 2026-04-21T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-04T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-07T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-08T12:55:00Z
10
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-09T12:55:00Z
11
value 0.00311
scoring_system epss
scoring_elements 0.54317
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2426
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992320
reference_id 1992320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992320
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2426
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gm7z-m589-77gy
45
url VCID-gu2a-fwhq-pqhs
vulnerability_id VCID-gu2a-fwhq-pqhs
summary mysql: Server: Components Services unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21368
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39145
published_at 2026-04-02T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.3884
published_at 2026-04-24T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39113
published_at 2026-04-13T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-16T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39137
published_at 2026-04-18T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39049
published_at 2026-04-21T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39167
published_at 2026-04-04T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39086
published_at 2026-04-07T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39141
published_at 2026-04-08T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39157
published_at 2026-04-09T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39169
published_at 2026-04-11T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.39132
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21368
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043643
reference_id 2043643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043643
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:09Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21368
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gu2a-fwhq-pqhs
46
url VCID-gwce-mjav-abcz
vulnerability_id VCID-gwce-mjav-abcz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21265
reference_id
reference_type
scores
0
value 0.0021
scoring_system epss
scoring_elements 0.43424
published_at 2026-04-02T12:55:00Z
1
value 0.0021
scoring_system epss
scoring_elements 0.4334
published_at 2026-04-24T12:55:00Z
2
value 0.0021
scoring_system epss
scoring_elements 0.4344
published_at 2026-04-08T12:55:00Z
3
value 0.0021
scoring_system epss
scoring_elements 0.43454
published_at 2026-04-09T12:55:00Z
4
value 0.0021
scoring_system epss
scoring_elements 0.43472
published_at 2026-04-11T12:55:00Z
5
value 0.0021
scoring_system epss
scoring_elements 0.43441
published_at 2026-04-12T12:55:00Z
6
value 0.0021
scoring_system epss
scoring_elements 0.43426
published_at 2026-04-13T12:55:00Z
7
value 0.0021
scoring_system epss
scoring_elements 0.43485
published_at 2026-04-16T12:55:00Z
8
value 0.0021
scoring_system epss
scoring_elements 0.43474
published_at 2026-04-18T12:55:00Z
9
value 0.0021
scoring_system epss
scoring_elements 0.43409
published_at 2026-04-21T12:55:00Z
10
value 0.0021
scoring_system epss
scoring_elements 0.43451
published_at 2026-04-04T12:55:00Z
11
value 0.0021
scoring_system epss
scoring_elements 0.43389
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21265
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043626
reference_id 2043626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043626
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21265
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwce-mjav-abcz
47
url VCID-h558-qvwc-73hv
vulnerability_id VCID-h558-qvwc-73hv
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2385
reference_id
reference_type
scores
0
value 0.00396
scoring_system epss
scoring_elements 0.60327
published_at 2026-04-01T12:55:00Z
1
value 0.00396
scoring_system epss
scoring_elements 0.60402
published_at 2026-04-02T12:55:00Z
2
value 0.00396
scoring_system epss
scoring_elements 0.60473
published_at 2026-04-24T12:55:00Z
3
value 0.00396
scoring_system epss
scoring_elements 0.60446
published_at 2026-04-08T12:55:00Z
4
value 0.00396
scoring_system epss
scoring_elements 0.60462
published_at 2026-04-09T12:55:00Z
5
value 0.00396
scoring_system epss
scoring_elements 0.60483
published_at 2026-04-11T12:55:00Z
6
value 0.00396
scoring_system epss
scoring_elements 0.60469
published_at 2026-04-12T12:55:00Z
7
value 0.00396
scoring_system epss
scoring_elements 0.60449
published_at 2026-04-13T12:55:00Z
8
value 0.00396
scoring_system epss
scoring_elements 0.60491
published_at 2026-04-16T12:55:00Z
9
value 0.00396
scoring_system epss
scoring_elements 0.60499
published_at 2026-04-18T12:55:00Z
10
value 0.00396
scoring_system epss
scoring_elements 0.60489
published_at 2026-04-21T12:55:00Z
11
value 0.00396
scoring_system epss
scoring_elements 0.6043
published_at 2026-04-04T12:55:00Z
12
value 0.00396
scoring_system epss
scoring_elements 0.60397
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2385
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992307
reference_id 1992307
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992307
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
8
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2385
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h558-qvwc-73hv
48
url VCID-j6as-4yhs-dyhq
vulnerability_id VCID-j6as-4yhs-dyhq
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2424
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2424
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992318
reference_id 1992318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992318
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2424
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6as-4yhs-dyhq
49
url VCID-j734-hefa-1yaa
vulnerability_id VCID-j734-hefa-1yaa
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2372
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49828
published_at 2026-04-01T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.49888
published_at 2026-04-24T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49865
published_at 2026-04-02T12:55:00Z
3
value 0.00264
scoring_system epss
scoring_elements 0.49893
published_at 2026-04-04T12:55:00Z
4
value 0.00264
scoring_system epss
scoring_elements 0.49844
published_at 2026-04-07T12:55:00Z
5
value 0.00264
scoring_system epss
scoring_elements 0.49898
published_at 2026-04-08T12:55:00Z
6
value 0.00264
scoring_system epss
scoring_elements 0.49892
published_at 2026-04-09T12:55:00Z
7
value 0.00264
scoring_system epss
scoring_elements 0.4991
published_at 2026-04-11T12:55:00Z
8
value 0.00264
scoring_system epss
scoring_elements 0.49882
published_at 2026-04-12T12:55:00Z
9
value 0.00264
scoring_system epss
scoring_elements 0.49883
published_at 2026-04-13T12:55:00Z
10
value 0.00264
scoring_system epss
scoring_elements 0.49928
published_at 2026-04-16T12:55:00Z
11
value 0.00264
scoring_system epss
scoring_elements 0.49929
published_at 2026-04-18T12:55:00Z
12
value 0.00264
scoring_system epss
scoring_elements 0.49901
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2372
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992303
reference_id 1992303
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992303
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
7
reference_url https://security.archlinux.org/AVG-2226
reference_id AVG-2226
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2226
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
9
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
10
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
11
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
12
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
13
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
14
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
15
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
17
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
18
reference_url https://usn.ubuntu.com/5022-2/
reference_id USN-5022-2
reference_type
scores
url https://usn.ubuntu.com/5022-2/
19
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2372
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j734-hefa-1yaa
50
url VCID-k26n-5mxy-w7ak
vulnerability_id VCID-k26n-5mxy-w7ak
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21607
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66835
published_at 2026-04-02T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66923
published_at 2026-04-24T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66869
published_at 2026-04-13T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66902
published_at 2026-04-16T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66917
published_at 2026-04-18T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66899
published_at 2026-04-21T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.66861
published_at 2026-04-04T12:55:00Z
7
value 0.00522
scoring_system epss
scoring_elements 0.66833
published_at 2026-04-07T12:55:00Z
8
value 0.00522
scoring_system epss
scoring_elements 0.66882
published_at 2026-04-08T12:55:00Z
9
value 0.00522
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-09T12:55:00Z
10
value 0.00522
scoring_system epss
scoring_elements 0.66915
published_at 2026-04-11T12:55:00Z
11
value 0.00522
scoring_system epss
scoring_elements 0.66901
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21607
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142867
reference_id 2142867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142867
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:08Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21607
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k26n-5mxy-w7ak
51
url VCID-krjf-4xbf-s3dd
vulnerability_id VCID-krjf-4xbf-s3dd
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21444
reference_id
reference_type
scores
0
value 0.00365
scoring_system epss
scoring_elements 0.58474
published_at 2026-04-02T12:55:00Z
1
value 0.00365
scoring_system epss
scoring_elements 0.58484
published_at 2026-04-24T12:55:00Z
2
value 0.00365
scoring_system epss
scoring_elements 0.58521
published_at 2026-04-12T12:55:00Z
3
value 0.00365
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-13T12:55:00Z
4
value 0.00365
scoring_system epss
scoring_elements 0.58534
published_at 2026-04-16T12:55:00Z
5
value 0.00365
scoring_system epss
scoring_elements 0.58539
published_at 2026-04-18T12:55:00Z
6
value 0.00365
scoring_system epss
scoring_elements 0.58494
published_at 2026-04-04T12:55:00Z
7
value 0.00365
scoring_system epss
scoring_elements 0.58466
published_at 2026-04-07T12:55:00Z
8
value 0.00365
scoring_system epss
scoring_elements 0.58518
published_at 2026-04-21T12:55:00Z
9
value 0.00365
scoring_system epss
scoring_elements 0.58524
published_at 2026-04-09T12:55:00Z
10
value 0.00365
scoring_system epss
scoring_elements 0.58541
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21444
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082650
reference_id 2082650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082650
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:15Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
8
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21444
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krjf-4xbf-s3dd
52
url VCID-n7tf-y62f-wyfe
vulnerability_id VCID-n7tf-y62f-wyfe
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2374
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37312
published_at 2026-04-01T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37474
published_at 2026-04-02T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37091
published_at 2026-04-24T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37378
published_at 2026-04-08T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.3739
published_at 2026-04-09T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37402
published_at 2026-04-11T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37367
published_at 2026-04-12T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.3734
published_at 2026-04-13T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.37386
published_at 2026-04-16T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.37368
published_at 2026-04-18T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.37313
published_at 2026-04-21T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37499
published_at 2026-04-04T12:55:00Z
12
value 0.00164
scoring_system epss
scoring_elements 0.37327
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2374
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992304
reference_id 1992304
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992304
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2374
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7tf-y62f-wyfe
53
url VCID-nh7n-qv9q-8bda
vulnerability_id VCID-nh7n-qv9q-8bda
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21440
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51025
published_at 2026-04-02T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51037
published_at 2026-04-24T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51083
published_at 2026-04-12T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.51066
published_at 2026-04-13T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.5111
published_at 2026-04-18T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51087
published_at 2026-04-21T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.5105
published_at 2026-04-04T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.51007
published_at 2026-04-07T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51064
published_at 2026-04-08T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.5106
published_at 2026-04-09T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51104
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21440
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082649
reference_id 2082649
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082649
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:16Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21440
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nh7n-qv9q-8bda
54
url VCID-nn19-u26n-6qdd
vulnerability_id VCID-nn19-u26n-6qdd
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21379
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21379
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043648
reference_id 2043648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043648
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:00Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21379
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nn19-u26n-6qdd
55
url VCID-npk1-jstp-bkc7
vulnerability_id VCID-npk1-jstp-bkc7
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21352
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52552
published_at 2026-04-02T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52592
published_at 2026-04-24T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52611
published_at 2026-04-13T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52649
published_at 2026-04-16T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52656
published_at 2026-04-18T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52641
published_at 2026-04-21T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52579
published_at 2026-04-04T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52546
published_at 2026-04-07T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52597
published_at 2026-04-08T12:55:00Z
9
value 0.00293
scoring_system epss
scoring_elements 0.52591
published_at 2026-04-09T12:55:00Z
10
value 0.00293
scoring_system epss
scoring_elements 0.52642
published_at 2026-04-11T12:55:00Z
11
value 0.00293
scoring_system epss
scoring_elements 0.52625
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21352
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043639
reference_id 2043639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043639
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:19Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21352
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npk1-jstp-bkc7
56
url VCID-p341-9tza-nkcs
vulnerability_id VCID-p341-9tza-nkcs
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21339
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59716
published_at 2026-04-02T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.5976
published_at 2026-04-24T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59711
published_at 2026-04-07T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59762
published_at 2026-04-13T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59776
published_at 2026-04-09T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59796
published_at 2026-04-11T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.5978
published_at 2026-04-12T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.59799
published_at 2026-04-16T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59806
published_at 2026-04-18T12:55:00Z
9
value 0.00385
scoring_system epss
scoring_elements 0.59789
published_at 2026-04-21T12:55:00Z
10
value 0.00385
scoring_system epss
scoring_elements 0.59741
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21339
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043634
reference_id 2043634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043634
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21339
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p341-9tza-nkcs
57
url VCID-q4rs-91hh-yfe7
vulnerability_id VCID-q4rs-91hh-yfe7
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21256
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58191
published_at 2026-04-24T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58227
published_at 2026-04-21T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58183
published_at 2026-04-07T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58238
published_at 2026-04-08T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58243
published_at 2026-04-09T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.5826
published_at 2026-04-11T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58237
published_at 2026-04-12T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58218
published_at 2026-04-13T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-16T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58252
published_at 2026-04-18T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58211
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21256
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043624
reference_id 2043624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043624
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21256
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4rs-91hh-yfe7
58
url VCID-qhmn-p8zd-9qeh
vulnerability_id VCID-qhmn-p8zd-9qeh
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21245
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.39078
published_at 2026-04-02T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38771
published_at 2026-04-24T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.39068
published_at 2026-04-08T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.39083
published_at 2026-04-09T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.39096
published_at 2026-04-11T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.39059
published_at 2026-04-12T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.39038
published_at 2026-04-13T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.39093
published_at 2026-04-16T12:55:00Z
8
value 0.00175
scoring_system epss
scoring_elements 0.39063
published_at 2026-04-18T12:55:00Z
9
value 0.00175
scoring_system epss
scoring_elements 0.38979
published_at 2026-04-21T12:55:00Z
10
value 0.00175
scoring_system epss
scoring_elements 0.39097
published_at 2026-04-04T12:55:00Z
11
value 0.00175
scoring_system epss
scoring_elements 0.39015
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21245
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043620
reference_id 2043620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043620
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
9
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21245
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhmn-p8zd-9qeh
59
url VCID-qp52-bkgp-bbfu
vulnerability_id VCID-qp52-bkgp-bbfu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21479
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.53467
published_at 2026-04-02T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53546
published_at 2026-04-21T12:55:00Z
2
value 0.00302
scoring_system epss
scoring_elements 0.53542
published_at 2026-04-12T12:55:00Z
3
value 0.00302
scoring_system epss
scoring_elements 0.53525
published_at 2026-04-13T12:55:00Z
4
value 0.00302
scoring_system epss
scoring_elements 0.5356
published_at 2026-04-16T12:55:00Z
5
value 0.00302
scoring_system epss
scoring_elements 0.53566
published_at 2026-04-18T12:55:00Z
6
value 0.00302
scoring_system epss
scoring_elements 0.53493
published_at 2026-04-04T12:55:00Z
7
value 0.00302
scoring_system epss
scoring_elements 0.53462
published_at 2026-04-07T12:55:00Z
8
value 0.00302
scoring_system epss
scoring_elements 0.53514
published_at 2026-04-08T12:55:00Z
9
value 0.00302
scoring_system epss
scoring_elements 0.5351
published_at 2026-04-24T12:55:00Z
10
value 0.00302
scoring_system epss
scoring_elements 0.53559
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21479
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082659
reference_id 2082659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082659
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:45Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21479
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp52-bkgp-bbfu
60
url VCID-qqbf-2xy3-k3bs
vulnerability_id VCID-qqbf-2xy3-k3bs
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21418
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36488
published_at 2026-04-02T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36125
published_at 2026-04-24T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.3638
published_at 2026-04-13T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36421
published_at 2026-04-16T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36404
published_at 2026-04-18T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36349
published_at 2026-04-21T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36522
published_at 2026-04-04T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.3636
published_at 2026-04-07T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.3641
published_at 2026-04-08T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.3643
published_at 2026-04-09T12:55:00Z
10
value 0.00156
scoring_system epss
scoring_elements 0.36437
published_at 2026-04-11T12:55:00Z
11
value 0.00156
scoring_system epss
scoring_elements 0.36402
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21418
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082641
reference_id 2082641
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082641
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:36Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21418
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qqbf-2xy3-k3bs
61
url VCID-qv7j-a4nn-97f7
vulnerability_id VCID-qv7j-a4nn-97f7
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2389
reference_id
reference_type
scores
0
value 0.00552
scoring_system epss
scoring_elements 0.67956
published_at 2026-04-01T12:55:00Z
1
value 0.00552
scoring_system epss
scoring_elements 0.68093
published_at 2026-04-24T12:55:00Z
2
value 0.00552
scoring_system epss
scoring_elements 0.67979
published_at 2026-04-02T12:55:00Z
3
value 0.00552
scoring_system epss
scoring_elements 0.67998
published_at 2026-04-04T12:55:00Z
4
value 0.00552
scoring_system epss
scoring_elements 0.67977
published_at 2026-04-07T12:55:00Z
5
value 0.00552
scoring_system epss
scoring_elements 0.68028
published_at 2026-04-08T12:55:00Z
6
value 0.00552
scoring_system epss
scoring_elements 0.68042
published_at 2026-04-09T12:55:00Z
7
value 0.00552
scoring_system epss
scoring_elements 0.68066
published_at 2026-04-11T12:55:00Z
8
value 0.00552
scoring_system epss
scoring_elements 0.68052
published_at 2026-04-12T12:55:00Z
9
value 0.00552
scoring_system epss
scoring_elements 0.68017
published_at 2026-04-13T12:55:00Z
10
value 0.00552
scoring_system epss
scoring_elements 0.68054
published_at 2026-04-16T12:55:00Z
11
value 0.00552
scoring_system epss
scoring_elements 0.68067
published_at 2026-04-18T12:55:00Z
12
value 0.00552
scoring_system epss
scoring_elements 0.6805
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2389
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992309
reference_id 1992309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992309
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://security.archlinux.org/AVG-2226
reference_id AVG-2226
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2226
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
10
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
11
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
12
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
13
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
14
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
15
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
16
reference_url https://usn.ubuntu.com/5022-2/
reference_id USN-5022-2
reference_type
scores
url https://usn.ubuntu.com/5022-2/
17
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
19
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-880/
reference_id ZDI-21-880
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-880/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2389
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7j-a4nn-97f7
62
url VCID-rjhp-4nxn-zya4
vulnerability_id VCID-rjhp-4nxn-zya4
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21342
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48176
published_at 2026-04-24T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
11
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21342
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043635
reference_id 2043635
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043635
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:24Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21342
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rjhp-4nxn-zya4
63
url VCID-rqm1-abez-ska4
vulnerability_id VCID-rqm1-abez-ska4
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21412
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63179
published_at 2026-04-24T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21412
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082636
reference_id 2082636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082636
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:41Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21412
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rqm1-abez-ska4
64
url VCID-ruz5-9rez-77gq
vulnerability_id VCID-ruz5-9rez-77gq
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21370
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-02T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39424
published_at 2026-04-24T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39666
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39716
published_at 2026-04-16T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-18T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39603
published_at 2026-04-21T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39722
published_at 2026-04-04T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.3964
published_at 2026-04-07T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39694
published_at 2026-04-08T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39709
published_at 2026-04-09T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39718
published_at 2026-04-11T12:55:00Z
11
value 0.0018
scoring_system epss
scoring_elements 0.39682
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21370
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043644
reference_id 2043644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043644
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:08Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21370
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ruz5-9rez-77gq
65
url VCID-s1cy-v2fk-kua7
vulnerability_id VCID-s1cy-v2fk-kua7
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21454
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.6057
published_at 2026-04-02T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.60641
published_at 2026-04-24T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60621
published_at 2026-04-13T12:55:00Z
3
value 0.00398
scoring_system epss
scoring_elements 0.60663
published_at 2026-04-16T12:55:00Z
4
value 0.00398
scoring_system epss
scoring_elements 0.60669
published_at 2026-04-18T12:55:00Z
5
value 0.00398
scoring_system epss
scoring_elements 0.60655
published_at 2026-04-21T12:55:00Z
6
value 0.00398
scoring_system epss
scoring_elements 0.60599
published_at 2026-04-04T12:55:00Z
7
value 0.00398
scoring_system epss
scoring_elements 0.60568
published_at 2026-04-07T12:55:00Z
8
value 0.00398
scoring_system epss
scoring_elements 0.60617
published_at 2026-04-08T12:55:00Z
9
value 0.00398
scoring_system epss
scoring_elements 0.60632
published_at 2026-04-09T12:55:00Z
10
value 0.00398
scoring_system epss
scoring_elements 0.60657
published_at 2026-04-11T12:55:00Z
11
value 0.00398
scoring_system epss
scoring_elements 0.60642
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21454
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082653
reference_id 2082653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082653
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:06Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
8
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21454
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1cy-v2fk-kua7
66
url VCID-sg3r-6972-uyfz
vulnerability_id VCID-sg3r-6972-uyfz
summary mysql: Server: Logging unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21460
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.57074
published_at 2026-04-02T12:55:00Z
1
value 0.00345
scoring_system epss
scoring_elements 0.57031
published_at 2026-04-24T12:55:00Z
2
value 0.00345
scoring_system epss
scoring_elements 0.57118
published_at 2026-04-12T12:55:00Z
3
value 0.00345
scoring_system epss
scoring_elements 0.57126
published_at 2026-04-16T12:55:00Z
4
value 0.00345
scoring_system epss
scoring_elements 0.57121
published_at 2026-04-18T12:55:00Z
5
value 0.00345
scoring_system epss
scoring_elements 0.57099
published_at 2026-04-21T12:55:00Z
6
value 0.00345
scoring_system epss
scoring_elements 0.57098
published_at 2026-04-13T12:55:00Z
7
value 0.00345
scoring_system epss
scoring_elements 0.57075
published_at 2026-04-07T12:55:00Z
8
value 0.00345
scoring_system epss
scoring_elements 0.57125
published_at 2026-04-08T12:55:00Z
9
value 0.00345
scoring_system epss
scoring_elements 0.57127
published_at 2026-04-09T12:55:00Z
10
value 0.00345
scoring_system epss
scoring_elements 0.57139
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21460
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082656
reference_id 2082656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082656
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:00Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
8
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21460
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sg3r-6972-uyfz
67
url VCID-sguy-dt9t-ybgk
vulnerability_id VCID-sguy-dt9t-ybgk
summary mysql: Server: Locking unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2402
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2402
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992312
reference_id 1992312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992312
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2402
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sguy-dt9t-ybgk
68
url VCID-t6dn-wg6k-1ue6
vulnerability_id VCID-t6dn-wg6k-1ue6
summary mysql: Server: Compiling unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21367
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-02T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39424
published_at 2026-04-24T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39666
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39716
published_at 2026-04-16T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-18T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39603
published_at 2026-04-21T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39722
published_at 2026-04-04T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.3964
published_at 2026-04-07T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39694
published_at 2026-04-08T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39709
published_at 2026-04-09T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39718
published_at 2026-04-11T12:55:00Z
11
value 0.0018
scoring_system epss
scoring_elements 0.39682
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21367
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043642
reference_id 2043642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043642
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:10Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
7
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21367
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6dn-wg6k-1ue6
69
url VCID-tawp-6a7d-fycz
vulnerability_id VCID-tawp-6a7d-fycz
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21451
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46276
published_at 2026-04-02T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46281
published_at 2026-04-24T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46302
published_at 2026-04-13T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46359
published_at 2026-04-16T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46355
published_at 2026-04-18T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46299
published_at 2026-04-21T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46295
published_at 2026-04-04T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46242
published_at 2026-04-07T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46297
published_at 2026-04-09T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.46321
published_at 2026-04-11T12:55:00Z
10
value 0.00234
scoring_system epss
scoring_elements 0.46293
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21451
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082651
reference_id 2082651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082651
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:09Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
5
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
6
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
7
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
8
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
9
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
10
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
11
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
12
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
13
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
14
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21451
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tawp-6a7d-fycz
70
url VCID-tb6v-1rdb-m3hv
vulnerability_id VCID-tb6v-1rdb-m3hv
summary mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2352
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41316
published_at 2026-04-01T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41408
published_at 2026-04-02T12:55:00Z
2
value 0.00195
scoring_system epss
scoring_elements 0.41228
published_at 2026-04-24T12:55:00Z
3
value 0.00195
scoring_system epss
scoring_elements 0.41363
published_at 2026-04-07T12:55:00Z
4
value 0.00195
scoring_system epss
scoring_elements 0.41413
published_at 2026-04-08T12:55:00Z
5
value 0.00195
scoring_system epss
scoring_elements 0.41422
published_at 2026-04-09T12:55:00Z
6
value 0.00195
scoring_system epss
scoring_elements 0.41442
published_at 2026-04-11T12:55:00Z
7
value 0.00195
scoring_system epss
scoring_elements 0.4141
published_at 2026-04-18T12:55:00Z
8
value 0.00195
scoring_system epss
scoring_elements 0.41395
published_at 2026-04-13T12:55:00Z
9
value 0.00195
scoring_system epss
scoring_elements 0.41439
published_at 2026-04-16T12:55:00Z
10
value 0.00195
scoring_system epss
scoring_elements 0.41337
published_at 2026-04-21T12:55:00Z
11
value 0.00195
scoring_system epss
scoring_elements 0.41436
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2352
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992297
reference_id 1992297
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992297
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2352
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tb6v-1rdb-m3hv
71
url VCID-tbfj-dfqj-6ff1
vulnerability_id VCID-tbfj-dfqj-6ff1
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2425
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2425
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992319
reference_id 1992319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992319
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2425
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbfj-dfqj-6ff1
72
url VCID-txsg-dega-4fcs
vulnerability_id VCID-txsg-dega-4fcs
summary mysql: Server: Replication unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21415
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45297
published_at 2026-04-02T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45214
published_at 2026-04-24T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45307
published_at 2026-04-13T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45358
published_at 2026-04-16T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45353
published_at 2026-04-18T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45302
published_at 2026-04-21T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45319
published_at 2026-04-04T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45261
published_at 2026-04-07T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45317
published_at 2026-04-08T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45316
published_at 2026-04-09T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.45337
published_at 2026-04-11T12:55:00Z
11
value 0.00225
scoring_system epss
scoring_elements 0.45305
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21415
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082639
reference_id 2082639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082639
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:38Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21415
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-txsg-dega-4fcs
73
url VCID-uh48-944q-zbdx
vulnerability_id VCID-uh48-944q-zbdx
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21348
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48176
published_at 2026-04-24T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
11
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21348
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043637
reference_id 2043637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043637
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:21Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21348
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uh48-944q-zbdx
74
url VCID-ukyc-ycpk-6ff1
vulnerability_id VCID-ukyc-ycpk-6ff1
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21253
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58191
published_at 2026-04-24T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58227
published_at 2026-04-21T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58183
published_at 2026-04-07T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58238
published_at 2026-04-08T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58243
published_at 2026-04-09T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.5826
published_at 2026-04-11T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58237
published_at 2026-04-12T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58218
published_at 2026-04-13T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-16T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58252
published_at 2026-04-18T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58211
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21253
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043622
reference_id 2043622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043622
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21253
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukyc-ycpk-6ff1
75
url VCID-vsrs-874z-7qh7
vulnerability_id VCID-vsrs-874z-7qh7
summary mysql: Server: Memcached unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2340
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35794
published_at 2026-04-01T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35984
published_at 2026-04-02T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35609
published_at 2026-04-24T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35894
published_at 2026-04-08T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35917
published_at 2026-04-09T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35922
published_at 2026-04-11T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-12T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35858
published_at 2026-04-13T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35898
published_at 2026-04-16T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35885
published_at 2026-04-18T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35837
published_at 2026-04-21T12:55:00Z
11
value 0.00152
scoring_system epss
scoring_elements 0.36013
published_at 2026-04-04T12:55:00Z
12
value 0.00152
scoring_system epss
scoring_elements 0.35844
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2340
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992279
reference_id 1992279
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992279
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2340
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsrs-874z-7qh7
76
url VCID-vucs-k62a-xke9
vulnerability_id VCID-vucs-k62a-xke9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2418
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2418
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992316
reference_id 1992316
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992316
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2418
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vucs-k62a-xke9
77
url VCID-w1m7-xnmp-cyet
vulnerability_id VCID-w1m7-xnmp-cyet
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21459
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51025
published_at 2026-04-02T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51037
published_at 2026-04-24T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51083
published_at 2026-04-12T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.51066
published_at 2026-04-13T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.5111
published_at 2026-04-18T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51087
published_at 2026-04-21T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.5105
published_at 2026-04-04T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.51007
published_at 2026-04-07T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51064
published_at 2026-04-08T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.5106
published_at 2026-04-09T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51104
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21459
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082655
reference_id 2082655
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082655
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:01Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21459
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w1m7-xnmp-cyet
78
url VCID-w8gu-h6z8-wkcx
vulnerability_id VCID-w8gu-h6z8-wkcx
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2342
reference_id
reference_type
scores
0
value 0.0044
scoring_system epss
scoring_elements 0.63091
published_at 2026-04-01T12:55:00Z
1
value 0.0044
scoring_system epss
scoring_elements 0.6315
published_at 2026-04-02T12:55:00Z
2
value 0.0044
scoring_system epss
scoring_elements 0.63224
published_at 2026-04-24T12:55:00Z
3
value 0.0044
scoring_system epss
scoring_elements 0.63197
published_at 2026-04-08T12:55:00Z
4
value 0.0044
scoring_system epss
scoring_elements 0.63214
published_at 2026-04-09T12:55:00Z
5
value 0.0044
scoring_system epss
scoring_elements 0.63232
published_at 2026-04-11T12:55:00Z
6
value 0.0044
scoring_system epss
scoring_elements 0.63216
published_at 2026-04-12T12:55:00Z
7
value 0.0044
scoring_system epss
scoring_elements 0.63179
published_at 2026-04-13T12:55:00Z
8
value 0.0044
scoring_system epss
scoring_elements 0.63215
published_at 2026-04-16T12:55:00Z
9
value 0.0044
scoring_system epss
scoring_elements 0.63223
published_at 2026-04-18T12:55:00Z
10
value 0.0044
scoring_system epss
scoring_elements 0.63203
published_at 2026-04-21T12:55:00Z
11
value 0.0044
scoring_system epss
scoring_elements 0.6318
published_at 2026-04-04T12:55:00Z
12
value 0.0044
scoring_system epss
scoring_elements 0.63145
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2342
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992294
reference_id 1992294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992294
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
5
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
6
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
7
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
8
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2342
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w8gu-h6z8-wkcx
79
url VCID-wkz5-36y5-k7f7
vulnerability_id VCID-wkz5-36y5-k7f7
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21358
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.51057
published_at 2026-04-02T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51067
published_at 2026-04-24T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51098
published_at 2026-04-13T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.51136
published_at 2026-04-16T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51142
published_at 2026-04-18T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51119
published_at 2026-04-21T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51082
published_at 2026-04-04T12:55:00Z
7
value 0.00277
scoring_system epss
scoring_elements 0.51038
published_at 2026-04-07T12:55:00Z
8
value 0.00277
scoring_system epss
scoring_elements 0.51095
published_at 2026-04-08T12:55:00Z
9
value 0.00277
scoring_system epss
scoring_elements 0.51091
published_at 2026-04-09T12:55:00Z
10
value 0.00277
scoring_system epss
scoring_elements 0.51135
published_at 2026-04-11T12:55:00Z
11
value 0.00277
scoring_system epss
scoring_elements 0.51114
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21358
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043640
reference_id 2043640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043640
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:14Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21358
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wkz5-36y5-k7f7
80
url VCID-wm2n-ww3b-qkfp
vulnerability_id VCID-wm2n-ww3b-qkfp
summary mysql: Server: Replication unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21344
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-02T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39424
published_at 2026-04-24T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39666
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39716
published_at 2026-04-16T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-18T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39603
published_at 2026-04-21T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39722
published_at 2026-04-04T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.3964
published_at 2026-04-07T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39694
published_at 2026-04-08T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39709
published_at 2026-04-09T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39718
published_at 2026-04-11T12:55:00Z
11
value 0.0018
scoring_system epss
scoring_elements 0.39682
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21344
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043636
reference_id 2043636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043636
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:23Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
7
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21344
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm2n-ww3b-qkfp
81
url VCID-y3ue-d94d-vygc
vulnerability_id VCID-y3ue-d94d-vygc
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21264
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59716
published_at 2026-04-02T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.5976
published_at 2026-04-24T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59711
published_at 2026-04-07T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59762
published_at 2026-04-13T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59776
published_at 2026-04-09T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59796
published_at 2026-04-11T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.5978
published_at 2026-04-12T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.59799
published_at 2026-04-16T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59806
published_at 2026-04-18T12:55:00Z
9
value 0.00385
scoring_system epss
scoring_elements 0.59789
published_at 2026-04-21T12:55:00Z
10
value 0.00385
scoring_system epss
scoring_elements 0.59741
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21264
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043625
reference_id 2043625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043625
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21264
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3ue-d94d-vygc
82
url VCID-y5nf-6qad-13er
vulnerability_id VCID-y5nf-6qad-13er
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2444
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34671
published_at 2026-04-01T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34887
published_at 2026-04-02T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34547
published_at 2026-04-24T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34807
published_at 2026-04-13T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34845
published_at 2026-04-16T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34828
published_at 2026-04-18T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34784
published_at 2026-04-21T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34914
published_at 2026-04-04T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34791
published_at 2026-04-07T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34835
published_at 2026-04-08T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34864
published_at 2026-04-09T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-11T12:55:00Z
12
value 0.00145
scoring_system epss
scoring_elements 0.34831
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2444
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992326
reference_id 1992326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992326
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2444
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5nf-6qad-13er
83
url VCID-yn56-p3gf-13gf
vulnerability_id VCID-yn56-p3gf-13gf
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21437
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45297
published_at 2026-04-02T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45214
published_at 2026-04-24T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45307
published_at 2026-04-13T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45358
published_at 2026-04-16T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45353
published_at 2026-04-18T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45302
published_at 2026-04-21T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45319
published_at 2026-04-04T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45261
published_at 2026-04-07T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45317
published_at 2026-04-08T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45316
published_at 2026-04-09T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.45337
published_at 2026-04-11T12:55:00Z
11
value 0.00225
scoring_system epss
scoring_elements 0.45305
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21437
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082647
reference_id 2082647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082647
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:19Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21437
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yn56-p3gf-13gf
84
url VCID-yr11-2geq-k7aa
vulnerability_id VCID-yr11-2geq-k7aa
summary mysql: Server: GIS unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2417
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25718
published_at 2026-04-01T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.2579
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25543
published_at 2026-04-24T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25635
published_at 2026-04-13T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25636
published_at 2026-04-16T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.2562
published_at 2026-04-18T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25592
published_at 2026-04-21T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25832
published_at 2026-04-04T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25602
published_at 2026-04-07T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25675
published_at 2026-04-08T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25721
published_at 2026-04-09T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25734
published_at 2026-04-11T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25693
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2417
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992315
reference_id 1992315
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992315
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
5
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2417
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yr11-2geq-k7aa
85
url VCID-yvkw-q3bp-73d6
vulnerability_id VCID-yvkw-q3bp-73d6
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2412
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-24T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2412
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992314
reference_id 1992314
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992314
3
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
4
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2021-2412
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvkw-q3bp-73d6
86
url VCID-zcn4-h4j5-qfat
vulnerability_id VCID-zcn4-h4j5-qfat
summary mysql: Server: DDL unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21249
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35984
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35609
published_at 2026-04-24T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35894
published_at 2026-04-08T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35917
published_at 2026-04-09T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35922
published_at 2026-04-11T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-12T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35858
published_at 2026-04-13T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35898
published_at 2026-04-16T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35885
published_at 2026-04-18T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35837
published_at 2026-04-21T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.36013
published_at 2026-04-04T12:55:00Z
11
value 0.00152
scoring_system epss
scoring_elements 0.35844
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21249
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043621
reference_id 2043621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043621
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21249
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcn4-h4j5-qfat
87
url VCID-ze42-san9-aqdg
vulnerability_id VCID-ze42-san9-aqdg
summary mysql: Server: DML unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21301
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-02T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51293
published_at 2026-04-24T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51311
published_at 2026-04-08T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51308
published_at 2026-04-09T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51351
published_at 2026-04-11T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51331
published_at 2026-04-12T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-13T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51359
published_at 2026-04-16T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-18T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51346
published_at 2026-04-21T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-04T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51256
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21301
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043630
reference_id 2043630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043630
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21301
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ze42-san9-aqdg
88
url VCID-zxdt-rp17-ebbu
vulnerability_id VCID-zxdt-rp17-ebbu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21378
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48176
published_at 2026-04-24T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
11
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21378
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043647
reference_id 2043647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043647
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:01Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2022-21378
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxdt-rp17-ebbu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid