Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/931419?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "type": "deb", "namespace": "debian", "name": "mysql-8.0", "version": "8.0.36-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.0.37-1", "latest_non_vulnerable_version": "8.0.46-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77829?format=api", "vulnerability_id": "VCID-1df8-99y1-z3b1", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20973", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43221", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4336", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43349", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43285", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43219", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43293", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43321", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43258", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4331", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43325", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43346", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43314", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43298", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20973" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258784", "reference_id": "2258784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258784" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T20:36:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20973" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1df8-99y1-z3b1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77834?format=api", "vulnerability_id": "VCID-3tkk-bpmr-yygk", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20978", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44241", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44325", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44238", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44372", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44382", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44396", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20978" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258789", "reference_id": "2258789", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20978" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3tkk-bpmr-yygk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77838?format=api", "vulnerability_id": "VCID-75us-ex8b-9bea", "summary": "mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20984", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48509", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48569", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48526", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.4849", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48513", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48465", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.4852", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48516", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48538", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48573", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20984" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258793", "reference_id": "2258793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20984" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75us-ex8b-9bea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77828?format=api", "vulnerability_id": "VCID-8wy6-axhs-a7b9", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20972", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44241", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44325", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44238", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44372", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44382", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44396", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20972" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258783", "reference_id": "2258783", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20972" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8wy6-axhs-a7b9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77821?format=api", "vulnerability_id": "VCID-9mcw-ujzr-g7a4", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20965", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.667", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66659", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66627", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66676", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66661", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66686", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66593", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66619", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66591", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66639", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66652", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66671", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20965" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258776", "reference_id": "2258776", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258776" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0006/", "reference_id": "ntap-20240201-0006", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20965" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9mcw-ujzr-g7a4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74821?format=api", "vulnerability_id": "VCID-a3fa-dj6h-3bdg", "summary": "mysql: Optimizer unspecified vulnerability (CPU Jul 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21137.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21137.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21137", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33984", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34374", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34003", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34516", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34383", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34425", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34457", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34418", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34394", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34429", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34416", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21137" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298321", "reference_id": "2298321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298321" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2024.html", "reference_id": "cpujul2024.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:29:30Z/" } ], "url": "https://www.oracle.com/security-alerts/cpujul2024.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-21137" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a3fa-dj6h-3bdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77827?format=api", "vulnerability_id": "VCID-ab1w-d1qc-3yaa", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20971", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36987", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37314", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37296", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37243", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37019", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37401", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37317", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37329", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37295", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37267", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20971" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258782", "reference_id": "2258782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258782" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:46:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20971" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ab1w-d1qc-3yaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77839?format=api", "vulnerability_id": "VCID-cbw5-wtpg-4qh4", "summary": "mysql: Server: UDF unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20985", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70573", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70526", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70534", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70513", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70563", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70432", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.7045", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70428", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70488", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70512", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70497", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70483", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20985" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258794", "reference_id": "2258794", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258794" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T21:46:42Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20985" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbw5-wtpg-4qh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77816?format=api", "vulnerability_id": "VCID-f1km-fnbx-hqba", "summary": "mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51193", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51238", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51186", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51174", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51198", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51211", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51207", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51251", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.5123", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51216", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00278", "scoring_system": "epss", "scoring_elements": "0.51261", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20960" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258771", "reference_id": "2258771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20960" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1km-fnbx-hqba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77818?format=api", "vulnerability_id": "VCID-f6xm-t4e5-mkfv", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20962", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55474", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55454", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55489", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.5554", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55541", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55551", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.5553", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55549", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20962" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258773", "reference_id": "2258773", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258773" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20962" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f6xm-t4e5-mkfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77830?format=api", "vulnerability_id": "VCID-g57b-67q4-1bf3", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20974", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16897", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17009", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16912", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17186", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17238", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17018", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17108", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17166", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17141", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17094", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17033", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16968", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16972", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20974" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258785", "reference_id": "2258785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20974" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g57b-67q4-1bf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76846?format=api", "vulnerability_id": "VCID-hfza-ubb9-gbea", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20993", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35469", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35794", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35783", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35734", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35499", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35874", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35735", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35785", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35808", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35776", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35753", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20993" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275428", "reference_id": "2275428", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275428" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html", "reference_id": "cpuapr2024.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2024.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0014/", "reference_id": "ntap-20240426-0014", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240426-0014/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20993" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfza-ubb9-gbea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77826?format=api", "vulnerability_id": "VCID-hudn-9xy8-kudb", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20970", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48611", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.4867", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48627", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48597", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.4862", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48572", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48626", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48622", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48639", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48613", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00253", "scoring_system": "epss", "scoring_elements": "0.48675", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20970" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258781", "reference_id": "2258781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20970" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hudn-9xy8-kudb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76861?format=api", "vulnerability_id": "VCID-hyn3-nyeu-8bdw", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21055", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32555", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32878", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32856", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3282", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32671", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32964", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32999", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32822", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32869", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32898", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32862", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32836", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21055" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275444", "reference_id": "2275444", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275444" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html", "reference_id": "cpuapr2024.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2024.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0011/", "reference_id": "ntap-20240426-0011", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240426-0011/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-21055" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hyn3-nyeu-8bdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76865?format=api", "vulnerability_id": "VCID-j5dm-qp9g-uygv", "summary": "mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21061", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.35879", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36209", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36194", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36142", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.35912", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.3629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36323", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36157", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36225", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.3623", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36193", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36168", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21061" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275448", "reference_id": "2275448", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275448" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html", "reference_id": "cpuapr2024.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2024.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0014/", "reference_id": "ntap-20240426-0014", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240426-0014/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-21061" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j5dm-qp9g-uygv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77822?format=api", "vulnerability_id": "VCID-jhke-e5qv-dua9", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20966", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44241", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44325", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44238", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44372", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44382", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44396", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20966" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258777", "reference_id": "2258777", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258777" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20966" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jhke-e5qv-dua9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77833?format=api", "vulnerability_id": "VCID-knap-u7y6-duhy", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20977", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47682", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47701", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47756", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47749", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.4767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.4769", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.4764", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47695", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47714", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47691", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20977" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258788", "reference_id": "2258788", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258788" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:39:04Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20977" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-knap-u7y6-duhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77817?format=api", "vulnerability_id": "VCID-r7r8-ucgm-judb", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64624", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64592", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64604", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.6459", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.6461", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.6456", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64518", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64567", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64583", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64599", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64558", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20961" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258772", "reference_id": "2258772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258772" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:53:34Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20961" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7r8-ucgm-judb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77819?format=api", "vulnerability_id": "VCID-sm6e-jgke-g7cb", "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20963", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60856", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60864", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60869", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60853", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60843", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60775", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60804", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60768", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60817", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60833", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60854", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60841", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60822", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20963" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258774", "reference_id": "2258774", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258774" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20963" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sm6e-jgke-g7cb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76863?format=api", "vulnerability_id": "VCID-tn1d-ppx8-23ea", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21057", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30193", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30488", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30308", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30653", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30699", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30511", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.3057", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30605", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30608", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30543", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30524", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275446", "reference_id": "2275446", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275446" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html", "reference_id": "cpuapr2024.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T16:11:19Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2024.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-21057" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tn1d-ppx8-23ea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77825?format=api", "vulnerability_id": "VCID-ttph-u92a-z3cx", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20969", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32837", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32814", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32779", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32629", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32923", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32958", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.3278", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32827", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32856", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32819", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00133", "scoring_system": "epss", "scoring_elements": "0.32794", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20969" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258780", "reference_id": "2258780", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258780" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T19:54:38Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20969" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ttph-u92a-z3cx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77823?format=api", "vulnerability_id": "VCID-tv8p-rmhf-1ucm", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20967", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19181", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19284", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19294", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19192", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19518", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19565", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19283", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19361", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19413", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19418", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.1937", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19313", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20967" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258778", "reference_id": "2258778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258778" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:21Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20967" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tv8p-rmhf-1ucm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77832?format=api", "vulnerability_id": "VCID-u2pn-bks7-syhq", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20976", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44241", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44325", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44238", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44372", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44365", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44382", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44396", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20976" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258787", "reference_id": "2258787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20976" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u2pn-bks7-syhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77836?format=api", "vulnerability_id": "VCID-ucd7-7329-7qdm", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20982", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40223", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40344", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40235", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40427", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40453", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40377", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40428", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40439", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.4046", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40421", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40402", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.4045", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40419", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20982" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258791", "reference_id": "2258791", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20982" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucd7-7329-7qdm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77820?format=api", "vulnerability_id": "VCID-wvmj-yphj-2ybt", "summary": "mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20964", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55474", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55454", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55489", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.5554", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55541", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55551", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.5553", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55549", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20964" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258775", "reference_id": "2258775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258775" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20964" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wvmj-yphj-2ybt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77835?format=api", "vulnerability_id": "VCID-x695-8ykr-cffs", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20981", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.36987", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37314", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37296", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37243", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37019", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37401", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37317", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37329", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37295", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37267", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20981" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126", "reference_id": "1061126", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258790", "reference_id": "2258790", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258790" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/", "reference_id": "ntap-20240201-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:56:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240201-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619", "reference_id": "RHSA-2024:2619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2619" }, { "reference_url": "https://usn.ubuntu.com/6615-1/", "reference_id": "USN-6615-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6615-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-20981" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x695-8ykr-cffs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73650?format=api", "vulnerability_id": "VCID-y4ku-kd73-h3fe", "summary": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21200.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21200.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21200", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36766", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37031", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36797", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37216", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37047", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37098", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37121", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37087", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37106", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37088", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21200" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318875", "reference_id": "2318875", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318875" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894", "reference_id": "RHSA-2024:0894", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0894" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141", "reference_id": "RHSA-2024:1141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1141" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api", "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid" } ], "aliases": [ "CVE-2024-21200" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4ku-kd73-h3fe" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid" }