Lookup for vulnerable packages by Package URL.

GET /api/packages/931419?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "mysql-8.0",
    "version": "8.0.36-1",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "8.0.37-1",
    "latest_non_vulnerable_version": "8.0.46-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77829?format=api",
            "vulnerability_id": "VCID-1df8-99y1-z3b1",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20973",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43221",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4336",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43349",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43285",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43219",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43293",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43321",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43258",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4331",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43325",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43346",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43314",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43298",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20973"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258784",
                    "reference_id": "2258784",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258784"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T20:36:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20973"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1df8-99y1-z3b1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77834?format=api",
            "vulnerability_id": "VCID-3tkk-bpmr-yygk",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20978",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44241",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44325",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44238",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44308",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4436",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44365",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44382",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44405",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44396",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20978"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258789",
                    "reference_id": "2258789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20978"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3tkk-bpmr-yygk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77838?format=api",
            "vulnerability_id": "VCID-75us-ex8b-9bea",
            "summary": "mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20984",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48509",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48569",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48526",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4849",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48513",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48465",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4852",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48516",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48538",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48511",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48523",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48573",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20984"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258793",
                    "reference_id": "2258793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258793"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20984"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75us-ex8b-9bea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77828?format=api",
            "vulnerability_id": "VCID-8wy6-axhs-a7b9",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44241",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44325",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44238",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44308",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4436",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44365",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44382",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44405",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44396",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20972"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258783",
                    "reference_id": "2258783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258783"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20972"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8wy6-axhs-a7b9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77821?format=api",
            "vulnerability_id": "VCID-9mcw-ujzr-g7a4",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.667",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66659",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66627",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66662",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66676",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66661",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66686",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66593",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66619",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66591",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66639",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66652",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66671",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20965"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258776",
                    "reference_id": "2258776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258776"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0006/",
                    "reference_id": "ntap-20240201-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20965"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9mcw-ujzr-g7a4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74821?format=api",
            "vulnerability_id": "VCID-a3fa-dj6h-3bdg",
            "summary": "mysql: Optimizer unspecified vulnerability (CPU Jul 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21137.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21137.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33984",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34374",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34003",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34488",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34516",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34383",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34425",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34455",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34457",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34418",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34394",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34429",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34416",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21137"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298321",
                    "reference_id": "2298321",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298321"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2024.html",
                    "reference_id": "cpujul2024.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:29:30Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2024.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-21137"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a3fa-dj6h-3bdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77827?format=api",
            "vulnerability_id": "VCID-ab1w-d1qc-3yaa",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20971",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36987",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37314",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37296",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37243",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37019",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37401",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37426",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37254",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37305",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37317",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37329",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37295",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37267",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20971"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258782",
                    "reference_id": "2258782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258782"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:46:18Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20971"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ab1w-d1qc-3yaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77839?format=api",
            "vulnerability_id": "VCID-cbw5-wtpg-4qh4",
            "summary": "mysql: Server: UDF unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20985",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70573",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70526",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70534",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70513",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70563",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70432",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7045",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70428",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70473",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70488",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70512",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70497",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00638",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70483",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20985"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258794",
                    "reference_id": "2258794",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258794"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T21:46:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20985"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbw5-wtpg-4qh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77816?format=api",
            "vulnerability_id": "VCID-f1km-fnbx-hqba",
            "summary": "mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20960",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51193",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51238",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51186",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51174",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51156",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51211",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51207",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51251",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5123",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51216",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51254",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51261",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20960"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258771",
                    "reference_id": "2258771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258771"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20960"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1km-fnbx-hqba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77818?format=api",
            "vulnerability_id": "VCID-f6xm-t4e5-mkfv",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20962",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55474",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55552",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55454",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55488",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55512",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55489",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5554",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55541",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55551",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5553",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55513",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55549",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20962"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258773",
                    "reference_id": "2258773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258773"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20962"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f6xm-t4e5-mkfv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77830?format=api",
            "vulnerability_id": "VCID-g57b-67q4-1bf3",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16897",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17009",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16912",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17186",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17238",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17018",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17108",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17166",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17141",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17094",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17033",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16968",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16972",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20974"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258785",
                    "reference_id": "2258785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258785"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20974"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g57b-67q4-1bf3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76846?format=api",
            "vulnerability_id": "VCID-hfza-ubb9-gbea",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35469",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35794",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35783",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35734",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35499",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35874",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35904",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35735",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35785",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35808",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35816",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35776",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35753",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20993"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275428",
                    "reference_id": "2275428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275428"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
                    "reference_id": "cpuapr2024.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2024.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0014/",
                    "reference_id": "ntap-20240426-0014",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240426-0014/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20993"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfza-ubb9-gbea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77826?format=api",
            "vulnerability_id": "VCID-hudn-9xy8-kudb",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48611",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4867",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48627",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48597",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4862",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48572",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48622",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48639",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48613",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48625",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48675",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20970"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258781",
                    "reference_id": "2258781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20970"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hudn-9xy8-kudb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76861?format=api",
            "vulnerability_id": "VCID-hyn3-nyeu-8bdw",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32555",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32878",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32856",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3282",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32671",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32964",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32999",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32869",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32898",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32862",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32836",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21055"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275444",
                    "reference_id": "2275444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275444"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
                    "reference_id": "cpuapr2024.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2024.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0011/",
                    "reference_id": "ntap-20240426-0011",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240426-0011/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-21055"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hyn3-nyeu-8bdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76865?format=api",
            "vulnerability_id": "VCID-j5dm-qp9g-uygv",
            "summary": "mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21061",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35879",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36209",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36194",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36142",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35912",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3629",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36323",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36157",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36207",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36225",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3623",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36193",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36168",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21061"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275448",
                    "reference_id": "2275448",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275448"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
                    "reference_id": "cpuapr2024.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2024.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0014/",
                    "reference_id": "ntap-20240426-0014",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240426-0014/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-21061"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j5dm-qp9g-uygv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77822?format=api",
            "vulnerability_id": "VCID-jhke-e5qv-dua9",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44241",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44325",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44238",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44308",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4436",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44365",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44382",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44405",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44396",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20966"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258777",
                    "reference_id": "2258777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20966"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jhke-e5qv-dua9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77833?format=api",
            "vulnerability_id": "VCID-knap-u7y6-duhy",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47682",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47701",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47756",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47749",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4767",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4769",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4764",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47695",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47714",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00244",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47691",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20977"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258788",
                    "reference_id": "2258788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258788"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:39:04Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20977"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-knap-u7y6-duhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77817?format=api",
            "vulnerability_id": "VCID-r7r8-ucgm-judb",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64624",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64592",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64604",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6459",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6461",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6456",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64518",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64567",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64583",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64599",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64587",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64558",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20961"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258772",
                    "reference_id": "2258772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258772"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:53:34Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20961"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7r8-ucgm-judb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77819?format=api",
            "vulnerability_id": "VCID-sm6e-jgke-g7cb",
            "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20963",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60856",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60864",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60869",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60853",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60843",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60775",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60804",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60768",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60817",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60833",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60854",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60841",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00402",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60822",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20963"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258774",
                    "reference_id": "2258774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258774"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20963"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sm6e-jgke-g7cb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76863?format=api",
            "vulnerability_id": "VCID-tn1d-ppx8-23ea",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30193",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30488",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30308",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30653",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30699",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30511",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3057",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30605",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30608",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30564",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30543",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30524",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21057"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275446",
                    "reference_id": "2275446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275446"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
                    "reference_id": "cpuapr2024.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T16:11:19Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2024.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-21057"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tn1d-ppx8-23ea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77825?format=api",
            "vulnerability_id": "VCID-ttph-u92a-z3cx",
            "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20969",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32513",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32837",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32814",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32779",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32629",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32923",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32958",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3278",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32827",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32856",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32858",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32819",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32794",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20969"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258780",
                    "reference_id": "2258780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258780"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T19:54:38Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20969"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ttph-u92a-z3cx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77823?format=api",
            "vulnerability_id": "VCID-tv8p-rmhf-1ucm",
            "summary": "mysql: Server: Replication unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19181",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19275",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19284",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19294",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19192",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19518",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19565",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19361",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19413",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19418",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19313",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20967"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258778",
                    "reference_id": "2258778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258778"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:21Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20967"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tv8p-rmhf-1ucm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77832?format=api",
            "vulnerability_id": "VCID-u2pn-bks7-syhq",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44241",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44325",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44238",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44308",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4436",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44365",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44382",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44405",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44396",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20976"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258787",
                    "reference_id": "2258787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258787"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20976"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u2pn-bks7-syhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77836?format=api",
            "vulnerability_id": "VCID-ucd7-7329-7qdm",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40223",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40344",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40235",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40427",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40453",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40377",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40428",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40439",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4046",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40421",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40402",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4045",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40419",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20982"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258791",
                    "reference_id": "2258791",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20982"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucd7-7329-7qdm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77820?format=api",
            "vulnerability_id": "VCID-wvmj-yphj-2ybt",
            "summary": "mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20964",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55474",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55552",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55454",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55488",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55512",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55489",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5554",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55541",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55551",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5553",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55513",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55549",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20964"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258775",
                    "reference_id": "2258775",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258775"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20964"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wvmj-yphj-2ybt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77835?format=api",
            "vulnerability_id": "VCID-x695-8ykr-cffs",
            "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36987",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37314",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37296",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37243",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37019",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37401",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37426",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37254",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37305",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37317",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37329",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37295",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37267",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-20981"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126",
                    "reference_id": "1061126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258790",
                    "reference_id": "2258790",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258790"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0003/",
                    "reference_id": "ntap-20240201-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:56:05Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2619",
                    "reference_id": "RHSA-2024:2619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2619"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6615-1/",
                    "reference_id": "USN-6615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6615-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-20981"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x695-8ykr-cffs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73650?format=api",
            "vulnerability_id": "VCID-y4ku-kd73-h3fe",
            "summary": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21200.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21200.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36766",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36797",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37216",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37047",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37098",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37111",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37121",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37087",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3706",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37106",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37088",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21200"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318875",
                    "reference_id": "2318875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318875"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0894",
                    "reference_id": "RHSA-2024:0894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1141",
                    "reference_id": "RHSA-2024:1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1141"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931419?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-21200"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4ku-kd73-h3fe"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"
}