Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
Typedeb
Namespacedebian
Namemysql-8.0
Version8.0.33-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.0.34-1
Latest_non_vulnerable_version8.0.46-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-294p-669y-myd8
vulnerability_id VCID-294p-669y-myd8
summary mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21962.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21962.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21962
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21962
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188125
reference_id 2188125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188125
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21962
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-294p-669y-myd8
1
url VCID-379y-9g2h-ukhm
vulnerability_id VCID-379y-9g2h-ukhm
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22104.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22104.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22104
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07514
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07639
published_at 2026-04-21T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.076
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07586
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07511
published_at 2026-04-16T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07499
published_at 2026-04-18T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07536
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07595
published_at 2026-04-08T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07614
published_at 2026-04-09T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07613
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22104
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245028
reference_id 2245028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245028
3
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:54:45Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22104
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-379y-9g2h-ukhm
2
url VCID-3hz9-teg3-3ubj
vulnerability_id VCID-3hz9-teg3-3ubj
summary mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21940.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21940.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21940
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21940
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188119
reference_id 2188119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188119
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21940
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hz9-teg3-3ubj
3
url VCID-5yqx-aj43-7fer
vulnerability_id VCID-5yqx-aj43-7fer
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21977.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21977.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21977
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15839
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15699
published_at 2026-04-21T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15792
published_at 2026-04-12T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15722
published_at 2026-04-13T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15644
published_at 2026-04-16T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15653
published_at 2026-04-18T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15905
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15705
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.1579
published_at 2026-04-08T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.1585
published_at 2026-04-09T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15829
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21977
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188130
reference_id 2188130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188130
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:39Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21977
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqx-aj43-7fer
4
url VCID-78yc-ncfs-jyd8
vulnerability_id VCID-78yc-ncfs-jyd8
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21976.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21976.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21976
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-02T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14896
published_at 2026-04-21T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14999
published_at 2026-04-12T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.1494
published_at 2026-04-13T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14835
published_at 2026-04-16T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14841
published_at 2026-04-18T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.1513
published_at 2026-04-04T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14933
published_at 2026-04-07T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.15021
published_at 2026-04-08T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.15073
published_at 2026-04-09T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.15037
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21976
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188129
reference_id 2188129
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188129
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:41Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21976
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-78yc-ncfs-jyd8
5
url VCID-7ft5-5uaa-mqea
vulnerability_id VCID-7ft5-5uaa-mqea
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21929.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21929
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33873
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33758
published_at 2026-04-21T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33905
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.3376
published_at 2026-04-07T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33803
published_at 2026-04-08T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33836
published_at 2026-04-09T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33832
published_at 2026-04-11T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.3379
published_at 2026-04-18T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33767
published_at 2026-04-13T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33804
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21929
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188116
reference_id 2188116
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188116
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21929
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ft5-5uaa-mqea
6
url VCID-7jwt-xtch-y3g7
vulnerability_id VCID-7jwt-xtch-y3g7
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21933.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21933
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21933
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188117
reference_id 2188117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188117
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21933
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jwt-xtch-y3g7
7
url VCID-7nff-sauv-ekfw
vulnerability_id VCID-7nff-sauv-ekfw
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21920.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21920
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21920
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188115
reference_id 2188115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188115
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21920
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nff-sauv-ekfw
8
url VCID-bg4z-h1ya-bkg9
vulnerability_id VCID-bg4z-h1ya-bkg9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21935.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21935.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21935
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21935
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188118
reference_id 2188118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188118
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21935
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bg4z-h1ya-bkg9
9
url VCID-dp3v-716h-cbep
vulnerability_id VCID-dp3v-716h-cbep
summary mysql: Server: JSON unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21966.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21966
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12826
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12724
published_at 2026-04-21T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12744
published_at 2026-04-12T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12697
published_at 2026-04-13T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12601
published_at 2026-04-16T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12611
published_at 2026-04-18T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12878
published_at 2026-04-04T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1268
published_at 2026-04-07T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.1276
published_at 2026-04-08T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12812
published_at 2026-04-09T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12782
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21966
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188127
reference_id 2188127
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188127
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:48Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21966
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dp3v-716h-cbep
10
url VCID-ds2a-wbbd-7fev
vulnerability_id VCID-ds2a-wbbd-7fev
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21982.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21982.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21982
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13124
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.12985
published_at 2026-04-21T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13037
published_at 2026-04-12T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.12987
published_at 2026-04-13T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.12883
published_at 2026-04-16T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.12885
published_at 2026-04-18T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13178
published_at 2026-04-04T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.12977
published_at 2026-04-07T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13055
published_at 2026-04-08T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13106
published_at 2026-04-09T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13075
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21982
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188132
reference_id 2188132
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188132
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:35Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21982
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2a-wbbd-7fev
11
url VCID-fgud-y4d2-ekhu
vulnerability_id VCID-fgud-y4d2-ekhu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21946.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21946
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44344
published_at 2026-04-13T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.4432
published_at 2026-04-21T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44366
published_at 2026-04-04T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44303
published_at 2026-04-07T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44355
published_at 2026-04-08T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-09T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44377
published_at 2026-04-11T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44346
published_at 2026-04-12T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.444
published_at 2026-04-16T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44391
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21946
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188121
reference_id 2188121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188121
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21946
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgud-y4d2-ekhu
12
url VCID-hgnv-zdsm-wuaz
vulnerability_id VCID-hgnv-zdsm-wuaz
summary mysql: Server: Partition unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21955.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21955
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21955
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188124
reference_id 2188124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188124
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21955
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgnv-zdsm-wuaz
13
url VCID-khzk-mgcw-3ff6
vulnerability_id VCID-khzk-mgcw-3ff6
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21945.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21945
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21945
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188120
reference_id 2188120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188120
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21945
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-khzk-mgcw-3ff6
14
url VCID-mydc-k3wq-bkc2
vulnerability_id VCID-mydc-k3wq-bkc2
summary mysql: Server: Partition unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21953.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21953
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21953
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188123
reference_id 2188123
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188123
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21953
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mydc-k3wq-bkc2
15
url VCID-ngqt-qntm-hugw
vulnerability_id VCID-ngqt-qntm-hugw
summary mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21947.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21947
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21947
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188122
reference_id 2188122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188122
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21947
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngqt-qntm-hugw
16
url VCID-prbq-dh9s-bqas
vulnerability_id VCID-prbq-dh9s-bqas
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21911.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21911
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21911
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188109
reference_id 2188109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188109
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21911
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prbq-dh9s-bqas
17
url VCID-vwms-568k-gfe1
vulnerability_id VCID-vwms-568k-gfe1
summary mysql: Client programs unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21980.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21980.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21980
reference_id
reference_type
scores
0
value 0.00375
scoring_system epss
scoring_elements 0.59091
published_at 2026-04-02T12:55:00Z
1
value 0.00375
scoring_system epss
scoring_elements 0.59135
published_at 2026-04-21T12:55:00Z
2
value 0.00375
scoring_system epss
scoring_elements 0.59132
published_at 2026-04-09T12:55:00Z
3
value 0.00375
scoring_system epss
scoring_elements 0.5915
published_at 2026-04-16T12:55:00Z
4
value 0.00375
scoring_system epss
scoring_elements 0.59133
published_at 2026-04-12T12:55:00Z
5
value 0.00375
scoring_system epss
scoring_elements 0.59155
published_at 2026-04-18T12:55:00Z
6
value 0.00375
scoring_system epss
scoring_elements 0.59114
published_at 2026-04-13T12:55:00Z
7
value 0.00375
scoring_system epss
scoring_elements 0.59078
published_at 2026-04-07T12:55:00Z
8
value 0.00375
scoring_system epss
scoring_elements 0.59129
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21980
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188131
reference_id 2188131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188131
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-16T14:25:03Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
9
reference_url https://usn.ubuntu.com/6060-2/
reference_id USN-6060-2
reference_type
scores
url https://usn.ubuntu.com/6060-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21980
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwms-568k-gfe1
18
url VCID-xs7y-us9k-kycg
vulnerability_id VCID-xs7y-us9k-kycg
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21972.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21972.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21972
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13124
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.12985
published_at 2026-04-21T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13037
published_at 2026-04-12T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.12987
published_at 2026-04-13T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.12883
published_at 2026-04-16T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.12885
published_at 2026-04-18T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13178
published_at 2026-04-04T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.12977
published_at 2026-04-07T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13055
published_at 2026-04-08T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13106
published_at 2026-04-09T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13075
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21972
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188128
reference_id 2188128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188128
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:44Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21972
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xs7y-us9k-kycg
19
url VCID-z4a8-r35u-kqdn
vulnerability_id VCID-z4a8-r35u-kqdn
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21919.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21919
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21919
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188113
reference_id 2188113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188113
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21919
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4a8-r35u-kqdn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid