Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
Typedeb
Namespacedebian
Namemysql-8.0
Version8.0.34-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.0.35-1
Latest_non_vulnerable_version8.0.46-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4rwn-re96-xuct
vulnerability_id VCID-4rwn-re96-xuct
summary mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22048.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22048
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23637
published_at 2026-04-02T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23299
published_at 2026-04-24T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23675
published_at 2026-04-04T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23455
published_at 2026-04-07T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23525
published_at 2026-04-08T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23574
published_at 2026-04-09T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23593
published_at 2026-04-11T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23551
published_at 2026-04-12T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23497
published_at 2026-04-13T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.2351
published_at 2026-04-16T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23502
published_at 2026-04-18T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23482
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22048
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224217
reference_id 2224217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224217
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22048
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4rwn-re96-xuct
1
url VCID-5g57-6e4s-q3ec
vulnerability_id VCID-5g57-6e4s-q3ec
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22033.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22033.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22033
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13794
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13656
published_at 2026-04-24T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13851
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.1365
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13732
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13782
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13751
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13713
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13663
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13575
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13572
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13645
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22033
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224214
reference_id 2224214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224214
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
6
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
9
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
10
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
11
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
12
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22033
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5g57-6e4s-q3ec
2
url VCID-9gmt-rub8-mfgn
vulnerability_id VCID-9gmt-rub8-mfgn
summary mysql: Client programs unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22053.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22053
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21892
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21583
published_at 2026-04-24T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21945
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21711
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21788
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21845
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21856
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21817
published_at 2026-04-12T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21758
published_at 2026-04-13T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21759
published_at 2026-04-16T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21765
published_at 2026-04-18T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21731
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22053
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224218
reference_id 2224218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224218
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
12
reference_url https://usn.ubuntu.com/6288-2/
reference_id USN-6288-2
reference_type
scores
url https://usn.ubuntu.com/6288-2/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22053
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9gmt-rub8-mfgn
3
url VCID-bdsp-jhdj-5qdd
vulnerability_id VCID-bdsp-jhdj-5qdd
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22056.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22056
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35715
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35374
published_at 2026-04-24T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35741
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35622
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35668
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35691
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.357
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35656
published_at 2026-04-12T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35633
published_at 2026-04-13T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35673
published_at 2026-04-16T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35663
published_at 2026-04-18T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35612
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22056
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224220
reference_id 2224220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224220
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22056
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdsp-jhdj-5qdd
4
url VCID-btvr-seff-xqdj
vulnerability_id VCID-btvr-seff-xqdj
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22110.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22110.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22110
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20611
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22110
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245029
reference_id 2245029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245029
3
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
4
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
5
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22110
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-btvr-seff-xqdj
5
url VCID-cv2y-w2zv-9qbx
vulnerability_id VCID-cv2y-w2zv-9qbx
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22065.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22065
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20611
published_at 2026-04-24T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22065
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245017
reference_id 2245017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245017
3
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:43:52Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22065
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cv2y-w2zv-9qbx
6
url VCID-dguz-9k3b-gkbz
vulnerability_id VCID-dguz-9k3b-gkbz
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22115.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22115
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20611
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22115
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245034
reference_id 2245034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245034
3
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
4
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
5
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22115
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dguz-9k3b-gkbz
7
url VCID-fn1h-hq5h-83fn
vulnerability_id VCID-fn1h-hq5h-83fn
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22007.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22007
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14779
published_at 2026-04-02T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14671
published_at 2026-04-24T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14676
published_at 2026-04-13T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14571
published_at 2026-04-16T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14577
published_at 2026-04-18T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14639
published_at 2026-04-21T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14857
published_at 2026-04-04T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.1466
published_at 2026-04-07T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14751
published_at 2026-04-08T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14812
published_at 2026-04-09T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.1477
published_at 2026-04-11T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14732
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22007
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224212
reference_id 2224212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224212
4
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:27Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22007
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fn1h-hq5h-83fn
8
url VCID-gbqx-1475-5ugs
vulnerability_id VCID-gbqx-1475-5ugs
summary mysql: Server: UDF unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22111.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22111.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22111
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20611
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22111
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245030
reference_id 2245030
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245030
3
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
4
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
5
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22111
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbqx-1475-5ugs
9
url VCID-kvrm-v55z-q7gh
vulnerability_id VCID-kvrm-v55z-q7gh
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22046.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22046
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13794
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13656
published_at 2026-04-24T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13851
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.1365
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13732
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13782
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13751
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13713
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13663
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13575
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13572
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13645
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22046
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224216
reference_id 2224216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224216
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22046
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kvrm-v55z-q7gh
10
url VCID-njfq-ur78-bqgs
vulnerability_id VCID-njfq-ur78-bqgs
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22005.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22005.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22005
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13564
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13434
published_at 2026-04-24T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13626
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13424
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13505
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13554
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13527
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.1349
published_at 2026-04-12T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13444
published_at 2026-04-13T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13356
published_at 2026-04-16T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13354
published_at 2026-04-18T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13429
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22005
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224211
reference_id 2224211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224211
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22005
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njfq-ur78-bqgs
11
url VCID-p56t-h63z-9yhb
vulnerability_id VCID-p56t-h63z-9yhb
summary mysql: Server: DDL unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22058.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22058
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35715
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35374
published_at 2026-04-24T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35741
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35622
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35668
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35691
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.357
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35656
published_at 2026-04-12T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35633
published_at 2026-04-13T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35673
published_at 2026-04-16T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35663
published_at 2026-04-18T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35612
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22058
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224222
reference_id 2224222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224222
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22058
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p56t-h63z-9yhb
12
url VCID-pe84-64en-63dk
vulnerability_id VCID-pe84-64en-63dk
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22057.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22057
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.18053
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17776
published_at 2026-04-24T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18108
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17809
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17897
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17958
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17974
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17929
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.1788
published_at 2026-04-13T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17823
published_at 2026-04-16T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17833
published_at 2026-04-18T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.1787
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22057
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224221
reference_id 2224221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224221
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22057
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pe84-64en-63dk
13
url VCID-qt3k-tebq-7fhr
vulnerability_id VCID-qt3k-tebq-7fhr
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22054.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22054
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13564
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13434
published_at 2026-04-24T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13626
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13424
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13505
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13554
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13527
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.1349
published_at 2026-04-12T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13444
published_at 2026-04-13T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13356
published_at 2026-04-16T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13354
published_at 2026-04-18T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13429
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22054
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224219
reference_id 2224219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224219
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22054
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qt3k-tebq-7fhr
14
url VCID-r33z-et19-mfa8
vulnerability_id VCID-r33z-et19-mfa8
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21950.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21950
reference_id
reference_type
scores
0
value 0.00173
scoring_system epss
scoring_elements 0.38758
published_at 2026-04-08T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.38505
published_at 2026-04-24T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38717
published_at 2026-04-13T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38763
published_at 2026-04-16T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38742
published_at 2026-04-18T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38662
published_at 2026-04-21T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.3878
published_at 2026-04-04T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38708
published_at 2026-04-07T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.38769
published_at 2026-04-09T12:55:00Z
9
value 0.00173
scoring_system epss
scoring_elements 0.38781
published_at 2026-04-11T12:55:00Z
10
value 0.00173
scoring_system epss
scoring_elements 0.38745
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21950
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224209
reference_id 2224209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224209
4
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:36Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-21950
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r33z-et19-mfa8
15
url VCID-rt2r-64y1-8yhg
vulnerability_id VCID-rt2r-64y1-8yhg
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22008.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22008
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13794
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13656
published_at 2026-04-24T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13851
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.1365
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13732
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13782
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13751
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13713
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13663
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13575
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13572
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13645
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22008
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224213
reference_id 2224213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224213
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22008
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rt2r-64y1-8yhg
16
url VCID-w89v-ws3n-6bgj
vulnerability_id VCID-w89v-ws3n-6bgj
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22038.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22038.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22038
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10987
published_at 2026-04-02T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10901
published_at 2026-04-24T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.1105
published_at 2026-04-04T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-07T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10949
published_at 2026-04-08T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11003
published_at 2026-04-09T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11007
published_at 2026-04-11T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-12T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10951
published_at 2026-04-13T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10816
published_at 2026-04-16T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10829
published_at 2026-04-18T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10946
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22038
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224215
reference_id 2224215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224215
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22038
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w89v-ws3n-6bgj
17
url VCID-xwtb-h96c-kydx
vulnerability_id VCID-xwtb-h96c-kydx
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22113.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22113.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22113
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06684
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0687
published_at 2026-04-24T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06781
published_at 2026-04-13T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06712
published_at 2026-04-16T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06702
published_at 2026-04-18T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06862
published_at 2026-04-21T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06727
published_at 2026-04-04T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06711
published_at 2026-04-07T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06762
published_at 2026-04-08T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06795
published_at 2026-04-09T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06794
published_at 2026-04-11T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06787
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22113
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245032
reference_id 2245032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245032
3
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T15:06:18Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
0
url pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid
1
url pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid
2
url pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
purl pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid
aliases CVE-2023-22113
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwtb-h96c-kydx
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid