Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/931412?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "type": "deb", "namespace": "debian", "name": "mysql-8.0", "version": "8.0.29-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.0.30-1", "latest_non_vulnerable_version": "8.0.46-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79793?format=api", "vulnerability_id": "VCID-13v8-wt9t-8kcs", "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21362" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043641", "reference_id": "2043641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043641" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:11Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21362" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13v8-wt9t-8kcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80143?format=api", "vulnerability_id": "VCID-2sc2-r3y9-37as", "summary": "mysql: Server: Federated unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2354", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58105", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58191", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58204", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5826", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58252", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58227", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58183", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992298", "reference_id": "1992298", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992298" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2354" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2sc2-r3y9-37as" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80145?format=api", "vulnerability_id": "VCID-2sdk-9wte-n7ct", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2357", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59643", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59716", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59778", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59762", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59796", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59789", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5976", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59711", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2357" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992300", "reference_id": "1992300", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992300" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2357" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2sdk-9wte-n7ct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80146?format=api", "vulnerability_id": "VCID-31vn-exfm-kuh2", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2367", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63238", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63224", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63197", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2367" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992301", "reference_id": "1992301", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992301" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2367" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-31vn-exfm-kuh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79780?format=api", "vulnerability_id": "VCID-39ju-7pvp-hqbv", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21278", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62388", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62496", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62436", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6248", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62487", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62479", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62419", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62385", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62469", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62459", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21278" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043628", "reference_id": "2043628", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043628" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:49Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21278" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39ju-7pvp-hqbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80147?format=api", "vulnerability_id": "VCID-3wz3-pm9w-vkd7", "summary": "mysql: Server: DML unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2370", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63238", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63224", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63197", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2370" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992302", "reference_id": "1992302", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992302" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2370" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3wz3-pm9w-vkd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80156?format=api", "vulnerability_id": "VCID-3ye4-pp2j-nkcy", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2399", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2399" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992311", "reference_id": "1992311", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992311" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2399" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ye4-pp2j-nkcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79492?format=api", "vulnerability_id": "VCID-3zjk-18aa-9kbk", "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21413", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21413" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082637", "reference_id": "2082637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082637" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21413" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zjk-18aa-9kbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79784?format=api", "vulnerability_id": "VCID-4dc2-2bx4-uke7", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21303", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51366", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51311", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21303" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043632", "reference_id": "2043632", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043632" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21303" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4dc2-2bx4-uke7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80167?format=api", "vulnerability_id": "VCID-5hjy-fmy7-cyac", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54194", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2427" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992321", "reference_id": "1992321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2427" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjy-fmy7-cyac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80162?format=api", "vulnerability_id": "VCID-5msw-bc1r-23e7", "summary": "mysql: Server: PS unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2422", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41224", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41037", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41213", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41256", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41153", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41042", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41253", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.4118", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41236", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41258", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41227", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2422" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992317", "reference_id": "1992317", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2422" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5msw-bc1r-23e7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79790?format=api", "vulnerability_id": "VCID-5ufm-419u-2qg3", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21351", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62388", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62496", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62436", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6248", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62487", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62479", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62419", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62385", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62469", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62459", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21351" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043638", "reference_id": "2043638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043638" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21351" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ufm-419u-2qg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80140?format=api", "vulnerability_id": "VCID-6674-4tmg-1qbg", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41408", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41413", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41422", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41442", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.4141", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41395", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41337", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41228", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41222", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2339" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992280", "reference_id": "1992280", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2339" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6674-4tmg-1qbg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79785?format=api", "vulnerability_id": "VCID-68eb-ae7g-tbcj", "summary": "mysql: Server: Parser unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21304", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51366", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51311", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21304" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043633", "reference_id": "2043633", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043633" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21304" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-68eb-ae7g-tbcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80150?format=api", "vulnerability_id": "VCID-6u9x-qcnt-cqc8", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54814", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54914", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5493", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54929", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54941", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54923", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54938", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5492", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54895", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54911", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5488", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2383" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992305", "reference_id": "1992305", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992305" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2383" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6u9x-qcnt-cqc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78929?format=api", "vulnerability_id": "VCID-6ufw-3gfn-5ygm", "summary": "mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21605", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66937", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66899", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66923", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66869", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21605" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142866", "reference_id": "2142866", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142866" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:10Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21605" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ufw-3gfn-5ygm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78739?format=api", "vulnerability_id": "VCID-7g35-wex8-dygz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-21866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.6299", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65105", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65122", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65033", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65082", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65096", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65114", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65104", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65076", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65112", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65121", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-21866" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162273", "reference_id": "2162273", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162273" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2023-21866" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7g35-wex8-dygz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79495?format=api", "vulnerability_id": "VCID-7r77-wwtj-bbgs", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59305", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59339", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59341", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59374", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5938", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59361", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59293", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59344", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59359", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21417" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082640", "reference_id": "2082640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082640" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:37Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21417" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7r77-wwtj-bbgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80158?format=api", "vulnerability_id": "VCID-82ep-d3fc-dbc2", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2410", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2410" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992313", "reference_id": "1992313", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992313" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2410" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-82ep-d3fc-dbc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79509?format=api", "vulnerability_id": "VCID-8fkf-84dd-7ya2", "summary": "mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21457", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.82994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83113", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83041", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.8308", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83083", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83004", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83029", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83052", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83046", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21457" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082654", "reference_id": "2082654", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082654" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:03Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21457" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkf-84dd-7ya2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79783?format=api", "vulnerability_id": "VCID-8mnm-4cgf-2bbt", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21302", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63449", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63539", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.6351", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63527", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63477", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63513", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.6352", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63506", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63476", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63441", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63492", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21302" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043631", "reference_id": "2043631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043631" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21302" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8mnm-4cgf-2bbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79501?format=api", "vulnerability_id": "VCID-8t59-zf4q-afgb", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21436", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.5751", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57551", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21436" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082646", "reference_id": "2082646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082646" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21436" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8t59-zf4q-afgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79500?format=api", "vulnerability_id": "VCID-9851-8zjc-zfgf", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21435", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45221", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45353", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45305", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45307", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21435" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082645", "reference_id": "2082645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082645" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:21Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21435" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9851-8zjc-zfgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79493?format=api", "vulnerability_id": "VCID-9fvk-eqmz-zfcz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21414", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.5751", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57551", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21414" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082638", "reference_id": "2082638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082638" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21414" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9fvk-eqmz-zfcz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79779?format=api", "vulnerability_id": "VCID-9su2-mawm-8ued", "summary": "mysql: Server: Federated unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21270", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51366", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51311", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21270" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043627", "reference_id": "2043627", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043627" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21270" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9su2-mawm-8ued" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80151?format=api", "vulnerability_id": "VCID-b4wd-75p9-bqgh", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63238", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63224", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63197", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2384" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992306", "reference_id": "1992306", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992306" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2384" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4wd-75p9-bqgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79798?format=api", "vulnerability_id": "VCID-bf13-qnc8-gkeh", "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21374", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21374" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043646", "reference_id": "2043646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043646" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21374" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bf13-qnc8-gkeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80170?format=api", "vulnerability_id": "VCID-bg43-1ngx-17cb", "summary": "mysql: Server: DML unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2440", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34671", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34887", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34527", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34845", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34784", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34547", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34835", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34869", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34831", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34807", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2440" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992324", "reference_id": "1992324", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2440" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bg43-1ngx-17cb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80171?format=api", "vulnerability_id": "VCID-byam-rx6m-3yab", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2441", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2441" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992325", "reference_id": "1992325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2441" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byam-rx6m-3yab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80168?format=api", "vulnerability_id": "VCID-c5u7-hdrq-2qcm", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2429", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90078", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.9008", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90149", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90118", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90127", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90125", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.9012", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90137", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90134", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90092", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90112", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2429" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992322", "reference_id": "1992322", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-889/", "reference_id": "ZDI-21-889", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:35Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-889/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2429" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c5u7-hdrq-2qcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79507?format=api", "vulnerability_id": "VCID-cesc-kr1b-cugn", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21452", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.5751", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57551", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21452" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082652", "reference_id": "2082652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082652" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21452" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cesc-kr1b-cugn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80153?format=api", "vulnerability_id": "VCID-ckdu-28ct-2kb7", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2387" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992308", "reference_id": "1992308", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2387" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ckdu-28ct-2kb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79797?format=api", "vulnerability_id": "VCID-d3c8-yxse-gqa1", "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32321", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31885", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32225", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32203", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32175", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32013", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32359", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32259", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32222", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32191", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21372" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043645", "reference_id": "2043645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043645" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21372" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d3c8-yxse-gqa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79498?format=api", "vulnerability_id": "VCID-dbat-jj2y-sqbw", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21425", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.598", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59875", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59864", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59845", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.5989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59824", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59846", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.5988", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21425" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082643", "reference_id": "2082643", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082643" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21425" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dbat-jj2y-sqbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80169?format=api", "vulnerability_id": "VCID-dwdy-u6t6-d7d3", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2437", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992323", "reference_id": "1992323", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2437" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dwdy-u6t6-d7d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79503?format=api", "vulnerability_id": "VCID-e33p-spt4-33bn", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21438", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.5751", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57551", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21438" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082648", "reference_id": "2082648", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082648" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21438" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e33p-spt4-33bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79781?format=api", "vulnerability_id": "VCID-e8ge-ejs7-7ben", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21297", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39424", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39666", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21297" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043629", "reference_id": "2043629", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043629" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:46Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21297" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ge-ejs7-7ben" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80155?format=api", "vulnerability_id": "VCID-e8ty-bkjz-5bh4", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2390", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84423", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84363", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84385", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84386", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84388", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84414", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84327", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84329", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.8435", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84374", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2390" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992310", "reference_id": "1992310", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-881/", "reference_id": "ZDI-21-881", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:17Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-881/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2390" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ty-bkjz-5bh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79513?format=api", "vulnerability_id": "VCID-esze-5kfz-sfea", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56013", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56093", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56096", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56067", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55993", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56054", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56033", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56087", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56099", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56076", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56059", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21478" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082658", "reference_id": "2082658", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082658" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:46Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21478" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-esze-5kfz-sfea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79499?format=api", "vulnerability_id": "VCID-ezwh-q7de-abey", "summary": "mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21895", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22159", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22099", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22093", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22046", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21906", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22261", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22044", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22124", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22179", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21427" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082644", "reference_id": "2082644", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082644" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:32Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21427" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwh-q7de-abey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80144?format=api", "vulnerability_id": "VCID-f2hn-79mj-fyer", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2356", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47564", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47596", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47588", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47584", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47608", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47592", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.4765", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47642", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47587", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47533", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2356" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992299", "reference_id": "1992299", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992299" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2356" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f2hn-79mj-fyer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79512?format=api", "vulnerability_id": "VCID-f6px-shha-wqcn", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21462", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44345", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44237", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44401", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44391", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44321", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44234", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44367", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44304", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44355", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44378", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44346", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21462" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082657", "reference_id": "2082657", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082657" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:57Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21462" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f6px-shha-wqcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79497?format=api", "vulnerability_id": "VCID-fjxp-kyqj-7fgp", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21423" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082642", "reference_id": "2082642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082642" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:34Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21423" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fjxp-kyqj-7fgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79775?format=api", "vulnerability_id": "VCID-g6f6-1du9-ufhz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21254", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78322", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78436", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78362", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78394", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78376", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78369", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78397", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78428", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78336", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21254" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043623", "reference_id": "2043623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043623" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21254" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g6f6-1du9-ufhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80166?format=api", "vulnerability_id": "VCID-gm7z-m589-77gy", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2426", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54194", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2426" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992320", "reference_id": "1992320", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992320" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2426" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gm7z-m589-77gy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79795?format=api", "vulnerability_id": "VCID-gu2a-fwhq-pqhs", "summary": "mysql: Server: Components Services unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39145", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38817", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39168", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39137", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39049", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3884", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39167", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39169", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39132", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39113", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21368" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043643", "reference_id": "2043643", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043643" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21368" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gu2a-fwhq-pqhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79778?format=api", "vulnerability_id": "VCID-gwce-mjav-abcz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43424", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43344", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43454", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43472", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43426", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43474", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43409", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.4334", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43451", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43389", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.4344", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21265" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043626", "reference_id": "2043626", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043626" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21265" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwce-mjav-abcz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80152?format=api", "vulnerability_id": "VCID-h558-qvwc-73hv", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60327", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60402", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60487", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60462", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60483", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60449", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60491", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60499", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60489", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60473", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.6043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60397", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60446", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2385" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992307", "reference_id": "1992307", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992307" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2385" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h558-qvwc-73hv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80164?format=api", "vulnerability_id": "VCID-j6as-4yhs-dyhq", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2424" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992318", "reference_id": "1992318", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992318" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2424" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j6as-4yhs-dyhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80148?format=api", "vulnerability_id": "VCID-j734-hefa-1yaa", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49828", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49895", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49865", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49893", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.4991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49882", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49883", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49928", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49929", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49901", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49888", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992303", "reference_id": "1992303", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992303" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/", "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://security.archlinux.org/AVG-2226", "reference_id": "AVG-2226", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2226" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-2/", "reference_id": "USN-5022-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-2/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/", "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2372" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j734-hefa-1yaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78930?format=api", "vulnerability_id": "VCID-k26n-5mxy-w7ak", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21607", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64865", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66899", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66923", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66869", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21607" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142867", "reference_id": "2142867", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142867" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21607" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k26n-5mxy-w7ak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79505?format=api", "vulnerability_id": "VCID-krjf-4xbf-s3dd", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21444", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58495", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58534", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58539", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58484", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58466", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58518", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58541", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58521", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082650", "reference_id": "2082650", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082650" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:15Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21444" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krjf-4xbf-s3dd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80149?format=api", "vulnerability_id": "VCID-n7tf-y62f-wyfe", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2374", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37312", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37061", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3739", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37402", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3734", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37386", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37368", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37091", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37499", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37378", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2374" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992304", "reference_id": "1992304", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992304" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2374" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7tf-y62f-wyfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79504?format=api", "vulnerability_id": "VCID-nh7n-qv9q-8bda", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21440", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51045", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51066", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5111", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51087", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5105", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51064", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51104", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51083", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21440" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082649", "reference_id": "2082649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082649" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21440" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nh7n-qv9q-8bda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79800?format=api", "vulnerability_id": "VCID-nn19-u26n-6qdd", "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21379", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043648", "reference_id": "2043648", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043648" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:00Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21379" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nn19-u26n-6qdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79791?format=api", "vulnerability_id": "VCID-npk1-jstp-bkc7", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21352", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52552", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52649", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52656", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52641", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52592", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52579", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52546", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52591", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52625", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52611", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21352" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043639", "reference_id": "2043639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043639" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:19Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21352" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-npk1-jstp-bkc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79786?format=api", "vulnerability_id": "VCID-p341-9tza-nkcs", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59716", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59778", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59762", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59796", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59789", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5976", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59711", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21339" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043634", "reference_id": "2043634", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043634" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21339" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p341-9tza-nkcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79776?format=api", "vulnerability_id": "VCID-q4rs-91hh-yfe7", "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58191", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58204", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5826", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58252", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58227", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58183", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21256" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043624", "reference_id": "2043624", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043624" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21256" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q4rs-91hh-yfe7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79772?format=api", "vulnerability_id": "VCID-qhmn-p8zd-9qeh", "summary": "mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21245", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39078", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38747", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39083", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39096", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39059", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39093", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39063", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38979", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38771", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39097", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39068", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21245" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043620", "reference_id": "2043620", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043620" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21245" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhmn-p8zd-9qeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79514?format=api", "vulnerability_id": "VCID-qp52-bkgp-bbfu", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53467", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53525", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.5356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53546", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53493", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53514", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.5351", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53559", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53542", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21479" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082659", "reference_id": "2082659", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082659" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:45Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21479" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qp52-bkgp-bbfu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79496?format=api", "vulnerability_id": "VCID-qqbf-2xy3-k3bs", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21418", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36095", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36421", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36404", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36125", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3643", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36437", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3638", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21418" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082641", "reference_id": "2082641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082641" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:36Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21418" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqbf-2xy3-k3bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80154?format=api", "vulnerability_id": "VCID-qv7j-a4nn-97f7", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68101", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68028", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68042", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68066", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68052", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68017", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68067", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.6805", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68093", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992309", "reference_id": "1992309", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992309" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/", "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/" }, { "reference_url": "https://security.archlinux.org/AVG-2226", "reference_id": "AVG-2226", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-2/", "reference_id": "USN-5022-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-2/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/", "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-880/", "reference_id": "ZDI-21-880", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-880/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2389" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7j-a4nn-97f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79787?format=api", "vulnerability_id": "VCID-rjhp-4nxn-zya4", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21342" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043635", "reference_id": "2043635", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043635" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:24Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21342" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rjhp-4nxn-zya4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79491?format=api", "vulnerability_id": "VCID-rqm1-abez-ska4", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082636", "reference_id": "2082636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082636" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21412" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqm1-abez-ska4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79796?format=api", "vulnerability_id": "VCID-ruz5-9rez-77gq", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21370", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39424", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39666", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21370" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043644", "reference_id": "2043644", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043644" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21370" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ruz5-9rez-77gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79508?format=api", "vulnerability_id": "VCID-s1cy-v2fk-kua7", "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21454", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.6057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60653", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60663", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60669", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60655", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60641", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60599", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60617", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60657", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60621", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21454" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082653", "reference_id": "2082653", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082653" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:06Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21454" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s1cy-v2fk-kua7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79511?format=api", "vulnerability_id": "VCID-sg3r-6972-uyfz", "summary": "mysql: Server: Logging unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21460", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57074", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57049", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57126", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57121", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57099", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57031", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57125", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57127", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57139", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57118", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21460" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082656", "reference_id": "2082656", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082656" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:00Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21460" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sg3r-6972-uyfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80157?format=api", "vulnerability_id": "VCID-sguy-dt9t-ybgk", "summary": "mysql: Server: Locking unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2402", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2402" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992312", "reference_id": "1992312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2402" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sguy-dt9t-ybgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79794?format=api", "vulnerability_id": "VCID-t6dn-wg6k-1ue6", "summary": "mysql: Server: Compiling unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21367", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39424", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39666", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21367" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043642", "reference_id": "2043642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043642" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:10Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21367" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t6dn-wg6k-1ue6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79506?format=api", "vulnerability_id": "VCID-tawp-6a7d-fycz", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21451", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46276", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46292", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46355", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46281", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46242", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46297", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46321", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46293", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46302", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21451" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082651", "reference_id": "2082651", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082651" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21451" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tawp-6a7d-fycz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80142?format=api", "vulnerability_id": "VCID-tb6v-1rdb-m3hv", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2352", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41408", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41222", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41413", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41422", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41442", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.4141", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41395", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41337", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41228", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41363", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2352" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992297", "reference_id": "1992297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992297" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2352" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tb6v-1rdb-m3hv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80165?format=api", "vulnerability_id": "VCID-tbfj-dfqj-6ff1", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2425", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2425" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992319", "reference_id": "1992319", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992319" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2425" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tbfj-dfqj-6ff1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79494?format=api", "vulnerability_id": "VCID-txsg-dega-4fcs", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21415", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45221", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45353", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45305", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45307", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21415" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082639", "reference_id": "2082639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082639" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:38Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21415" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-txsg-dega-4fcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79789?format=api", "vulnerability_id": "VCID-uh48-944q-zbdx", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21348", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21348" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043637", "reference_id": "2043637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043637" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:21Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21348" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uh48-944q-zbdx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79774?format=api", "vulnerability_id": "VCID-ukyc-ycpk-6ff1", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21253", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58191", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58204", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5826", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58252", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58227", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58183", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21253" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043622", "reference_id": "2043622", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043622" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21253" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukyc-ycpk-6ff1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80139?format=api", "vulnerability_id": "VCID-vsrs-874z-7qh7", "summary": "mysql: Server: Memcached unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35794", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35984", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35577", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35917", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35609", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.36013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35894", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2340" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992279", "reference_id": "1992279", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992279" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2340" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vsrs-874z-7qh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80161?format=api", "vulnerability_id": "VCID-vucs-k62a-xke9", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2418", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2418" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992316", "reference_id": "1992316", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2418" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vucs-k62a-xke9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79510?format=api", "vulnerability_id": "VCID-w1m7-xnmp-cyet", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21459", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51045", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51066", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5111", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51087", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5105", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51064", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51104", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51083", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21459" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082655", "reference_id": "2082655", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082655" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21459" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w1m7-xnmp-cyet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80141?format=api", "vulnerability_id": "VCID-w8gu-h6z8-wkcx", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63238", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63224", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63197", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2342" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992294", "reference_id": "1992294", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992294" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2342" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8gu-h6z8-wkcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79792?format=api", "vulnerability_id": "VCID-wkz5-36y5-k7f7", "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21358", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51075", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51136", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51142", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51119", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51067", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51082", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51038", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51095", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51091", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51135", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51114", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51098", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21358" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043640", "reference_id": "2043640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043640" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:14Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21358" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wkz5-36y5-k7f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79788?format=api", "vulnerability_id": "VCID-wm2n-ww3b-qkfp", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39424", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39666", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21344" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043636", "reference_id": "2043636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043636" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21344" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wm2n-ww3b-qkfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79777?format=api", "vulnerability_id": "VCID-y3ue-d94d-vygc", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21264", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59716", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59778", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59762", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59796", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59789", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5976", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59711", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21264" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043625", "reference_id": "2043625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043625" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21264" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y3ue-d94d-vygc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80172?format=api", "vulnerability_id": "VCID-y5nf-6qad-13er", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2444", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34671", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34887", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34527", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34845", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34784", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34547", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34835", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34869", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34831", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34807", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992326", "reference_id": "1992326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2444" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y5nf-6qad-13er" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79502?format=api", "vulnerability_id": "VCID-yn56-p3gf-13gf", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21437", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45221", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45353", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45305", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45307", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082647", "reference_id": "2082647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082647" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:19Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21437" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yn56-p3gf-13gf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80160?format=api", "vulnerability_id": "VCID-yr11-2geq-k7aa", "summary": "mysql: Server: GIS unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2579", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25535", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25636", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2562", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25592", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25543", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25832", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25602", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25675", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25721", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25734", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25635", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2417" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992315", "reference_id": "1992315", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2417" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yr11-2geq-k7aa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80159?format=api", "vulnerability_id": "VCID-yvkw-q3bp-73d6", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992314", "reference_id": "1992314", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992314" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2021-2412" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yvkw-q3bp-73d6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79773?format=api", "vulnerability_id": "VCID-zcn4-h4j5-qfat", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21249", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35984", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35577", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35917", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35609", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.36013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35894", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21249" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043621", "reference_id": "2043621", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043621" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21249" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zcn4-h4j5-qfat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79782?format=api", "vulnerability_id": "VCID-ze42-san9-aqdg", "summary": "mysql: Server: DML unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21301", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51366", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51311", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21301" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043630", "reference_id": "2043630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043630" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21301" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ze42-san9-aqdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79799?format=api", "vulnerability_id": "VCID-zxdt-rp17-ebbu", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21378", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21378" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043647", "reference_id": "2043647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043647" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931412?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-21378" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxdt-rp17-ebbu" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid" }