Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-mysql80-mysql@8.0.36-1?arch=el7
Typerpm
Namespaceredhat
Namerh-mysql80-mysql
Version8.0.36-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-16fb-js2y-8yc6
vulnerability_id VCID-16fb-js2y-8yc6
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22059.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22059
reference_id
reference_type
scores
0
value 0.00252
scoring_system epss
scoring_elements 0.48485
published_at 2026-04-02T12:55:00Z
1
value 0.00252
scoring_system epss
scoring_elements 0.48522
published_at 2026-04-21T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.48506
published_at 2026-04-12T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48519
published_at 2026-04-13T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48569
published_at 2026-04-16T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.48564
published_at 2026-04-18T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48508
published_at 2026-04-04T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.4846
published_at 2026-04-07T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.48515
published_at 2026-04-08T12:55:00Z
9
value 0.00252
scoring_system epss
scoring_elements 0.48511
published_at 2026-04-09T12:55:00Z
10
value 0.00252
scoring_system epss
scoring_elements 0.48533
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22059
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245015
reference_id 2245015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245015
4
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:02Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22059
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16fb-js2y-8yc6
1
url VCID-1df8-99y1-z3b1
vulnerability_id VCID-1df8-99y1-z3b1
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20973
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43285
published_at 2026-04-21T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43314
published_at 2026-04-12T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43298
published_at 2026-04-13T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.4336
published_at 2026-04-16T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43349
published_at 2026-04-18T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43293
published_at 2026-04-02T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43321
published_at 2026-04-04T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43258
published_at 2026-04-07T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.4331
published_at 2026-04-08T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43325
published_at 2026-04-09T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43346
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20973
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258784
reference_id 2258784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258784
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T20:36:20Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20973
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1df8-99y1-z3b1
2
url VCID-1fdz-twax-fybv
vulnerability_id VCID-1fdz-twax-fybv
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22112.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22112.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22112
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22112
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245031
reference_id 2245031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245031
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22112
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fdz-twax-fybv
3
url VCID-1hh9-am1z-rqf1
vulnerability_id VCID-1hh9-am1z-rqf1
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22103.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22103
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22103
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245027
reference_id 2245027
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245027
4
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T21:12:49Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22103
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1hh9-am1z-rqf1
4
url VCID-294p-669y-myd8
vulnerability_id VCID-294p-669y-myd8
summary mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21962.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21962.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21962
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21962
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188125
reference_id 2188125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188125
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21962
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-294p-669y-myd8
5
url VCID-2nqb-85ye-zbe3
vulnerability_id VCID-2nqb-85ye-zbe3
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21049.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21049.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21049
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27986
published_at 2026-04-21T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28098
published_at 2026-04-12T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28041
published_at 2026-04-13T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.2805
published_at 2026-04-16T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28034
published_at 2026-04-18T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28186
published_at 2026-04-02T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.2823
published_at 2026-04-04T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28024
published_at 2026-04-07T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28091
published_at 2026-04-08T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28135
published_at 2026-04-09T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.28142
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21049
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275437
reference_id 2275437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275437
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:45:12Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
5
reference_url https://security.netapp.com/advisory/ntap-20240426-0012/
reference_id ntap-20240426-0012
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:45:12Z/
url https://security.netapp.com/advisory/ntap-20240426-0012/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21049
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2nqb-85ye-zbe3
6
url VCID-2u2z-cas8-8ya3
vulnerability_id VCID-2u2z-cas8-8ya3
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21053.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21053
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27486
published_at 2026-04-21T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27601
published_at 2026-04-12T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27544
published_at 2026-04-13T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27552
published_at 2026-04-16T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27525
published_at 2026-04-18T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27701
published_at 2026-04-02T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27739
published_at 2026-04-04T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27529
published_at 2026-04-07T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27598
published_at 2026-04-08T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27641
published_at 2026-04-09T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27646
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21053
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275441
reference_id 2275441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275441
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T15:46:02Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
5
reference_url https://security.netapp.com/advisory/ntap-20240426-0012/
reference_id ntap-20240426-0012
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T15:46:02Z/
url https://security.netapp.com/advisory/ntap-20240426-0012/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21053
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2u2z-cas8-8ya3
7
url VCID-379y-9g2h-ukhm
vulnerability_id VCID-379y-9g2h-ukhm
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22104.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22104.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22104
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07514
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07639
published_at 2026-04-21T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.076
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07586
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07511
published_at 2026-04-16T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07499
published_at 2026-04-18T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07536
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07595
published_at 2026-04-08T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07614
published_at 2026-04-09T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07613
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22104
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245028
reference_id 2245028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245028
3
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:54:45Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2023-22104
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-379y-9g2h-ukhm
8
url VCID-3hz9-teg3-3ubj
vulnerability_id VCID-3hz9-teg3-3ubj
summary mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21940.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21940.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21940
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21940
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188119
reference_id 2188119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188119
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21940
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hz9-teg3-3ubj
9
url VCID-3tkk-bpmr-yygk
vulnerability_id VCID-3tkk-bpmr-yygk
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20978
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44325
published_at 2026-04-21T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44405
published_at 2026-04-16T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44396
published_at 2026-04-18T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.4435
published_at 2026-04-12T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44372
published_at 2026-04-04T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44308
published_at 2026-04-07T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-08T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44365
published_at 2026-04-09T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44382
published_at 2026-04-11T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44349
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20978
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258789
reference_id 2258789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258789
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20978
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tkk-bpmr-yygk
10
url VCID-3v27-puhg-tudv
vulnerability_id VCID-3v27-puhg-tudv
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22114.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22114.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22114
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22114
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245033
reference_id 2245033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245033
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22114
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3v27-puhg-tudv
11
url VCID-4rwn-re96-xuct
vulnerability_id VCID-4rwn-re96-xuct
summary mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22048.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22048
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23637
published_at 2026-04-02T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23482
published_at 2026-04-21T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23675
published_at 2026-04-04T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23455
published_at 2026-04-07T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23525
published_at 2026-04-08T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23574
published_at 2026-04-09T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23593
published_at 2026-04-11T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23551
published_at 2026-04-12T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23497
published_at 2026-04-13T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.2351
published_at 2026-04-16T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23502
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22048
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224217
reference_id 2224217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224217
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22048
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4rwn-re96-xuct
12
url VCID-5ew9-e39r-n7d7
vulnerability_id VCID-5ew9-e39r-n7d7
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22032.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22032.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22032
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31733
published_at 2026-04-02T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31587
published_at 2026-04-21T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31643
published_at 2026-04-12T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31607
published_at 2026-04-13T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.3164
published_at 2026-04-16T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31619
published_at 2026-04-18T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31778
published_at 2026-04-04T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31596
published_at 2026-04-07T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31649
published_at 2026-04-08T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31679
published_at 2026-04-09T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.31683
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22032
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245014
reference_id 2245014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245014
4
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T20:28:06Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22032
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ew9-e39r-n7d7
13
url VCID-5f3m-nszz-pub2
vulnerability_id VCID-5f3m-nszz-pub2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22064.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22064.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22064
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22064
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245016
reference_id 2245016
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245016
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22064
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5f3m-nszz-pub2
14
url VCID-5g57-6e4s-q3ec
vulnerability_id VCID-5g57-6e4s-q3ec
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22033.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22033.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22033
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13794
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13645
published_at 2026-04-21T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13851
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.1365
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13732
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13782
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13751
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13713
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13663
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13575
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13572
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22033
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224214
reference_id 2224214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224214
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
6
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
9
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
10
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
11
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
12
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22033
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5g57-6e4s-q3ec
15
url VCID-5yqx-aj43-7fer
vulnerability_id VCID-5yqx-aj43-7fer
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21977.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21977.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21977
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15839
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15699
published_at 2026-04-21T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15792
published_at 2026-04-12T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15722
published_at 2026-04-13T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15644
published_at 2026-04-16T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15653
published_at 2026-04-18T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15905
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15705
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.1579
published_at 2026-04-08T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.1585
published_at 2026-04-09T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15829
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21977
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188130
reference_id 2188130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188130
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:39Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21977
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqx-aj43-7fer
16
url VCID-6atg-7j6k-dkhp
vulnerability_id VCID-6atg-7j6k-dkhp
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22084
reference_id
reference_type
scores
0
value 0.01362
scoring_system epss
scoring_elements 0.8013
published_at 2026-04-02T12:55:00Z
1
value 0.01362
scoring_system epss
scoring_elements 0.8015
published_at 2026-04-04T12:55:00Z
2
value 0.01362
scoring_system epss
scoring_elements 0.80138
published_at 2026-04-07T12:55:00Z
3
value 0.01362
scoring_system epss
scoring_elements 0.80167
published_at 2026-04-08T12:55:00Z
4
value 0.01362
scoring_system epss
scoring_elements 0.80174
published_at 2026-04-09T12:55:00Z
5
value 0.01362
scoring_system epss
scoring_elements 0.80193
published_at 2026-04-11T12:55:00Z
6
value 0.01362
scoring_system epss
scoring_elements 0.80178
published_at 2026-04-12T12:55:00Z
7
value 0.01362
scoring_system epss
scoring_elements 0.80169
published_at 2026-04-13T12:55:00Z
8
value 0.01362
scoring_system epss
scoring_elements 0.80198
published_at 2026-04-18T12:55:00Z
9
value 0.01362
scoring_system epss
scoring_elements 0.802
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245023
reference_id 2245023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245023
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
9
reference_url https://access.redhat.com/errata/RHSA-2025:0739
reference_id RHSA-2025:0739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0739
10
reference_url https://access.redhat.com/errata/RHSA-2025:0914
reference_id RHSA-2025:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0914
11
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
12
reference_url https://usn.ubuntu.com/6583-1/
reference_id USN-6583-1
reference_type
scores
url https://usn.ubuntu.com/6583-1/
13
reference_url https://usn.ubuntu.com/6600-1/
reference_id USN-6600-1
reference_type
scores
url https://usn.ubuntu.com/6600-1/
fixed_packages
aliases CVE-2023-22084
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6atg-7j6k-dkhp
17
url VCID-75us-ex8b-9bea
vulnerability_id VCID-75us-ex8b-9bea
summary mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20984
reference_id
reference_type
scores
0
value 0.00252
scoring_system epss
scoring_elements 0.48526
published_at 2026-04-21T12:55:00Z
1
value 0.00252
scoring_system epss
scoring_elements 0.48573
published_at 2026-04-16T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.48569
published_at 2026-04-18T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.4849
published_at 2026-04-02T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48513
published_at 2026-04-04T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.48465
published_at 2026-04-07T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.4852
published_at 2026-04-08T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48516
published_at 2026-04-09T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.48538
published_at 2026-04-11T12:55:00Z
9
value 0.00252
scoring_system epss
scoring_elements 0.48511
published_at 2026-04-12T12:55:00Z
10
value 0.00252
scoring_system epss
scoring_elements 0.48523
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20984
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258793
reference_id 2258793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258793
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20984
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75us-ex8b-9bea
18
url VCID-78yc-ncfs-jyd8
vulnerability_id VCID-78yc-ncfs-jyd8
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21976.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21976.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21976
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-02T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14896
published_at 2026-04-21T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14999
published_at 2026-04-12T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.1494
published_at 2026-04-13T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14835
published_at 2026-04-16T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14841
published_at 2026-04-18T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.1513
published_at 2026-04-04T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14933
published_at 2026-04-07T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.15021
published_at 2026-04-08T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.15073
published_at 2026-04-09T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.15037
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21976
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188129
reference_id 2188129
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188129
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:41Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21976
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-78yc-ncfs-jyd8
19
url VCID-7ft5-5uaa-mqea
vulnerability_id VCID-7ft5-5uaa-mqea
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21929.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21929
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33873
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33758
published_at 2026-04-21T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33905
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.3376
published_at 2026-04-07T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33803
published_at 2026-04-08T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33836
published_at 2026-04-09T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33832
published_at 2026-04-11T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.3379
published_at 2026-04-18T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33767
published_at 2026-04-13T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33804
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21929
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188116
reference_id 2188116
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188116
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21929
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ft5-5uaa-mqea
20
url VCID-7jwt-xtch-y3g7
vulnerability_id VCID-7jwt-xtch-y3g7
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21933.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21933
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21933
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188117
reference_id 2188117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188117
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21933
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jwt-xtch-y3g7
21
url VCID-7nff-sauv-ekfw
vulnerability_id VCID-7nff-sauv-ekfw
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21920.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21920
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21920
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188115
reference_id 2188115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188115
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21920
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nff-sauv-ekfw
22
url VCID-7r4v-t4uj-a7az
vulnerability_id VCID-7r4v-t4uj-a7az
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21050.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21050
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25075
published_at 2026-04-21T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32836
published_at 2026-04-13T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32856
published_at 2026-04-18T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32878
published_at 2026-04-16T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32964
published_at 2026-04-02T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32999
published_at 2026-04-04T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32822
published_at 2026-04-07T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32869
published_at 2026-04-08T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32898
published_at 2026-04-09T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32899
published_at 2026-04-11T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21050
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275438
reference_id 2275438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275438
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:59:29Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
5
reference_url https://security.netapp.com/advisory/ntap-20240426-0012/
reference_id ntap-20240426-0012
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:59:29Z/
url https://security.netapp.com/advisory/ntap-20240426-0012/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21050
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7r4v-t4uj-a7az
23
url VCID-8wy6-axhs-a7b9
vulnerability_id VCID-8wy6-axhs-a7b9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20972
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44325
published_at 2026-04-21T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44405
published_at 2026-04-16T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44396
published_at 2026-04-18T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.4435
published_at 2026-04-12T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44372
published_at 2026-04-04T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44308
published_at 2026-04-07T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-08T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44365
published_at 2026-04-09T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44382
published_at 2026-04-11T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44349
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20972
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258783
reference_id 2258783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258783
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20972
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wy6-axhs-a7b9
24
url VCID-9573-txzw-6yhb
vulnerability_id VCID-9573-txzw-6yhb
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22097.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22097.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22097
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22097
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245026
reference_id 2245026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245026
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22097
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9573-txzw-6yhb
25
url VCID-968h-b244-cqeu
vulnerability_id VCID-968h-b244-cqeu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22079.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22079.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22079
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33491
published_at 2026-04-02T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33524
published_at 2026-04-04T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33365
published_at 2026-04-07T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33409
published_at 2026-04-08T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33444
published_at 2026-04-09T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33447
published_at 2026-04-11T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33405
published_at 2026-04-12T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33383
published_at 2026-04-13T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-16T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33394
published_at 2026-04-18T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33361
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22079
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245022
reference_id 2245022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245022
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22079
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-968h-b244-cqeu
26
url VCID-9gmt-rub8-mfgn
vulnerability_id VCID-9gmt-rub8-mfgn
summary mysql: Client programs unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22053.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22053
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21892
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21731
published_at 2026-04-21T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21945
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21711
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21788
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21845
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21856
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21817
published_at 2026-04-12T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21758
published_at 2026-04-13T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21759
published_at 2026-04-16T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21765
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22053
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224218
reference_id 2224218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224218
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
12
reference_url https://usn.ubuntu.com/6288-2/
reference_id USN-6288-2
reference_type
scores
url https://usn.ubuntu.com/6288-2/
fixed_packages
aliases CVE-2023-22053
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9gmt-rub8-mfgn
27
url VCID-9mcw-ujzr-g7a4
vulnerability_id VCID-9mcw-ujzr-g7a4
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20965
reference_id
reference_type
scores
0
value 0.00515
scoring_system epss
scoring_elements 0.66661
published_at 2026-04-21T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66652
published_at 2026-04-09T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.66671
published_at 2026-04-11T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.66659
published_at 2026-04-12T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.66627
published_at 2026-04-13T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.66662
published_at 2026-04-16T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.66676
published_at 2026-04-18T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.66593
published_at 2026-04-02T12:55:00Z
8
value 0.00515
scoring_system epss
scoring_elements 0.66619
published_at 2026-04-04T12:55:00Z
9
value 0.00515
scoring_system epss
scoring_elements 0.66591
published_at 2026-04-07T12:55:00Z
10
value 0.00515
scoring_system epss
scoring_elements 0.66639
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20965
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258776
reference_id 2258776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258776
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://security.netapp.com/advisory/ntap-20240201-0006/
reference_id ntap-20240201-0006
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/
url https://security.netapp.com/advisory/ntap-20240201-0006/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
9
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20965
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mcw-ujzr-g7a4
28
url VCID-9nv5-fnr2-aqch
vulnerability_id VCID-9nv5-fnr2-aqch
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22070.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22070
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22070
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245020
reference_id 2245020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245020
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22070
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nv5-fnr2-aqch
29
url VCID-ab1w-d1qc-3yaa
vulnerability_id VCID-ab1w-d1qc-3yaa
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20971
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37243
published_at 2026-04-21T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37295
published_at 2026-04-12T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37267
published_at 2026-04-13T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37314
published_at 2026-04-16T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.37296
published_at 2026-04-18T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37401
published_at 2026-04-02T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37426
published_at 2026-04-04T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37254
published_at 2026-04-07T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37305
published_at 2026-04-08T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.37317
published_at 2026-04-09T12:55:00Z
10
value 0.00163
scoring_system epss
scoring_elements 0.37329
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20971
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258782
reference_id 2258782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258782
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:46:18Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20971
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ab1w-d1qc-3yaa
30
url VCID-bdsp-jhdj-5qdd
vulnerability_id VCID-bdsp-jhdj-5qdd
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22056.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22056
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35715
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35612
published_at 2026-04-21T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35741
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35622
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35668
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35691
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.357
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35656
published_at 2026-04-12T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35633
published_at 2026-04-13T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35673
published_at 2026-04-16T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35663
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22056
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224220
reference_id 2224220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224220
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22056
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdsp-jhdj-5qdd
31
url VCID-bg4z-h1ya-bkg9
vulnerability_id VCID-bg4z-h1ya-bkg9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21935.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21935.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21935
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21935
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188118
reference_id 2188118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188118
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21935
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bg4z-h1ya-bkg9
32
url VCID-btvr-seff-xqdj
vulnerability_id VCID-btvr-seff-xqdj
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22110.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22110.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22110
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22110
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245029
reference_id 2245029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245029
3
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
4
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
5
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2023-22110
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-btvr-seff-xqdj
33
url VCID-cbw5-wtpg-4qh4
vulnerability_id VCID-cbw5-wtpg-4qh4
summary mysql: Server: UDF unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20985
reference_id
reference_type
scores
0
value 0.00638
scoring_system epss
scoring_elements 0.70513
published_at 2026-04-21T12:55:00Z
1
value 0.00638
scoring_system epss
scoring_elements 0.70497
published_at 2026-04-12T12:55:00Z
2
value 0.00638
scoring_system epss
scoring_elements 0.70483
published_at 2026-04-13T12:55:00Z
3
value 0.00638
scoring_system epss
scoring_elements 0.70526
published_at 2026-04-16T12:55:00Z
4
value 0.00638
scoring_system epss
scoring_elements 0.70534
published_at 2026-04-18T12:55:00Z
5
value 0.00638
scoring_system epss
scoring_elements 0.70432
published_at 2026-04-02T12:55:00Z
6
value 0.00638
scoring_system epss
scoring_elements 0.7045
published_at 2026-04-04T12:55:00Z
7
value 0.00638
scoring_system epss
scoring_elements 0.70428
published_at 2026-04-07T12:55:00Z
8
value 0.00638
scoring_system epss
scoring_elements 0.70473
published_at 2026-04-08T12:55:00Z
9
value 0.00638
scoring_system epss
scoring_elements 0.70488
published_at 2026-04-09T12:55:00Z
10
value 0.00638
scoring_system epss
scoring_elements 0.70512
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20985
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258794
reference_id 2258794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258794
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T21:46:42Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20985
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbw5-wtpg-4qh4
34
url VCID-cv2y-w2zv-9qbx
vulnerability_id VCID-cv2y-w2zv-9qbx
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22065.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22065
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22065
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245017
reference_id 2245017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245017
3
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:43:52Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2023-22065
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cv2y-w2zv-9qbx
35
url VCID-dguz-9k3b-gkbz
vulnerability_id VCID-dguz-9k3b-gkbz
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22115.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22115
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22115
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245034
reference_id 2245034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245034
3
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
4
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
5
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2023-22115
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dguz-9k3b-gkbz
36
url VCID-dp3v-716h-cbep
vulnerability_id VCID-dp3v-716h-cbep
summary mysql: Server: JSON unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21966.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21966
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12826
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12724
published_at 2026-04-21T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12744
published_at 2026-04-12T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12697
published_at 2026-04-13T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12601
published_at 2026-04-16T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12611
published_at 2026-04-18T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12878
published_at 2026-04-04T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1268
published_at 2026-04-07T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.1276
published_at 2026-04-08T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12812
published_at 2026-04-09T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12782
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21966
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188127
reference_id 2188127
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188127
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:48Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21966
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dp3v-716h-cbep
37
url VCID-ds2a-wbbd-7fev
vulnerability_id VCID-ds2a-wbbd-7fev
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21982.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21982.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21982
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13124
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.12985
published_at 2026-04-21T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13037
published_at 2026-04-12T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.12987
published_at 2026-04-13T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.12883
published_at 2026-04-16T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.12885
published_at 2026-04-18T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13178
published_at 2026-04-04T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.12977
published_at 2026-04-07T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13055
published_at 2026-04-08T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13106
published_at 2026-04-09T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13075
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21982
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188132
reference_id 2188132
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188132
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:35Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21982
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2a-wbbd-7fev
38
url VCID-e9t1-br7a-zuc2
vulnerability_id VCID-e9t1-br7a-zuc2
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21052.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21052
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24788
published_at 2026-04-21T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24862
published_at 2026-04-12T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24806
published_at 2026-04-13T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24818
published_at 2026-04-16T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.2481
published_at 2026-04-18T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24958
published_at 2026-04-02T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24999
published_at 2026-04-04T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24774
published_at 2026-04-07T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24842
published_at 2026-04-08T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24886
published_at 2026-04-09T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24901
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21052
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275440
reference_id 2275440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275440
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:13:41Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
5
reference_url https://security.netapp.com/advisory/ntap-20240426-0012/
reference_id ntap-20240426-0012
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:13:41Z/
url https://security.netapp.com/advisory/ntap-20240426-0012/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21052
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e9t1-br7a-zuc2
39
url VCID-f1km-fnbx-hqba
vulnerability_id VCID-f1km-fnbx-hqba
summary mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20960
reference_id
reference_type
scores
0
value 0.00278
scoring_system epss
scoring_elements 0.51238
published_at 2026-04-21T12:55:00Z
1
value 0.00278
scoring_system epss
scoring_elements 0.51254
published_at 2026-04-16T12:55:00Z
2
value 0.00278
scoring_system epss
scoring_elements 0.51261
published_at 2026-04-18T12:55:00Z
3
value 0.00278
scoring_system epss
scoring_elements 0.51174
published_at 2026-04-02T12:55:00Z
4
value 0.00278
scoring_system epss
scoring_elements 0.51198
published_at 2026-04-04T12:55:00Z
5
value 0.00278
scoring_system epss
scoring_elements 0.51156
published_at 2026-04-07T12:55:00Z
6
value 0.00278
scoring_system epss
scoring_elements 0.51211
published_at 2026-04-08T12:55:00Z
7
value 0.00278
scoring_system epss
scoring_elements 0.51207
published_at 2026-04-09T12:55:00Z
8
value 0.00278
scoring_system epss
scoring_elements 0.51251
published_at 2026-04-11T12:55:00Z
9
value 0.00278
scoring_system epss
scoring_elements 0.5123
published_at 2026-04-12T12:55:00Z
10
value 0.00278
scoring_system epss
scoring_elements 0.51216
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20960
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258771
reference_id 2258771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258771
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20960
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f1km-fnbx-hqba
40
url VCID-f6xm-t4e5-mkfv
vulnerability_id VCID-f6xm-t4e5-mkfv
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20962
reference_id
reference_type
scores
0
value 0.00325
scoring_system epss
scoring_elements 0.55552
published_at 2026-04-18T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.55513
published_at 2026-04-13T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55549
published_at 2026-04-16T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.55488
published_at 2026-04-02T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55512
published_at 2026-04-04T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55489
published_at 2026-04-07T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.5554
published_at 2026-04-08T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55541
published_at 2026-04-09T12:55:00Z
8
value 0.00325
scoring_system epss
scoring_elements 0.55551
published_at 2026-04-11T12:55:00Z
9
value 0.00325
scoring_system epss
scoring_elements 0.5553
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20962
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258773
reference_id 2258773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258773
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20962
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6xm-t4e5-mkfv
41
url VCID-fgud-y4d2-ekhu
vulnerability_id VCID-fgud-y4d2-ekhu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21946.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21946
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44344
published_at 2026-04-13T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.4432
published_at 2026-04-21T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44366
published_at 2026-04-04T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44303
published_at 2026-04-07T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44355
published_at 2026-04-08T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-09T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44377
published_at 2026-04-11T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44346
published_at 2026-04-12T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.444
published_at 2026-04-16T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44391
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21946
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188121
reference_id 2188121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188121
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21946
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgud-y4d2-ekhu
42
url VCID-fn1h-hq5h-83fn
vulnerability_id VCID-fn1h-hq5h-83fn
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22007.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22007
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14779
published_at 2026-04-02T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14639
published_at 2026-04-21T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14732
published_at 2026-04-12T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14676
published_at 2026-04-13T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14571
published_at 2026-04-16T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14577
published_at 2026-04-18T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14857
published_at 2026-04-04T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.1466
published_at 2026-04-07T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14751
published_at 2026-04-08T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14812
published_at 2026-04-09T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.1477
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22007
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224212
reference_id 2224212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224212
4
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:27Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2023-22007
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fn1h-hq5h-83fn
43
url VCID-g2z6-qhe8-7fd1
vulnerability_id VCID-g2z6-qhe8-7fd1
summary mysql: Server: Options unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20968.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20968.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20968
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19724
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19709
published_at 2026-04-16T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19711
published_at 2026-04-18T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.1992
published_at 2026-04-02T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19976
published_at 2026-04-04T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19702
published_at 2026-04-07T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19782
published_at 2026-04-08T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19834
published_at 2026-04-09T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19836
published_at 2026-04-11T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19791
published_at 2026-04-12T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19734
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20968
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258779
reference_id 2258779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258779
3
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
4
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
5
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-20968
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2z6-qhe8-7fd1
44
url VCID-g57b-67q4-1bf3
vulnerability_id VCID-g57b-67q4-1bf3
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20974
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17009
published_at 2026-04-21T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16968
published_at 2026-04-16T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16972
published_at 2026-04-18T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17186
published_at 2026-04-02T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17238
published_at 2026-04-04T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17018
published_at 2026-04-07T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17108
published_at 2026-04-08T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17166
published_at 2026-04-09T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.17141
published_at 2026-04-11T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17094
published_at 2026-04-12T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.17033
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20974
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258785
reference_id 2258785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258785
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20974
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g57b-67q4-1bf3
45
url VCID-gbqx-1475-5ugs
vulnerability_id VCID-gbqx-1475-5ugs
summary mysql: Server: UDF unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22111.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22111.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22111
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22111
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245030
reference_id 2245030
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245030
3
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
4
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
5
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2023-22111
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbqx-1475-5ugs
46
url VCID-hfza-ubb9-gbea
vulnerability_id VCID-hfza-ubb9-gbea
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20993
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35734
published_at 2026-04-21T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35776
published_at 2026-04-12T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35753
published_at 2026-04-13T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35794
published_at 2026-04-16T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35783
published_at 2026-04-18T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35874
published_at 2026-04-02T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35904
published_at 2026-04-04T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35735
published_at 2026-04-07T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35785
published_at 2026-04-08T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35808
published_at 2026-04-09T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35816
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20993
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275428
reference_id 2275428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275428
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*
5
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0014/
reference_id ntap-20240426-0014
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/
url https://security.netapp.com/advisory/ntap-20240426-0014/
7
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
8
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
9
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-20993
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hfza-ubb9-gbea
47
url VCID-hgnv-zdsm-wuaz
vulnerability_id VCID-hgnv-zdsm-wuaz
summary mysql: Server: Partition unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21955.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21955
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21955
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188124
reference_id 2188124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188124
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21955
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgnv-zdsm-wuaz
48
url VCID-hudn-9xy8-kudb
vulnerability_id VCID-hudn-9xy8-kudb
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20970
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.48627
published_at 2026-04-21T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48675
published_at 2026-04-16T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.4867
published_at 2026-04-18T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48597
published_at 2026-04-02T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.4862
published_at 2026-04-04T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.48572
published_at 2026-04-07T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48626
published_at 2026-04-08T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.48622
published_at 2026-04-09T12:55:00Z
8
value 0.00253
scoring_system epss
scoring_elements 0.48639
published_at 2026-04-11T12:55:00Z
9
value 0.00253
scoring_system epss
scoring_elements 0.48613
published_at 2026-04-12T12:55:00Z
10
value 0.00253
scoring_system epss
scoring_elements 0.48625
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20970
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258781
reference_id 2258781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258781
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20970
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hudn-9xy8-kudb
49
url VCID-hyn3-nyeu-8bdw
vulnerability_id VCID-hyn3-nyeu-8bdw
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21055
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.3282
published_at 2026-04-21T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-12T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32836
published_at 2026-04-13T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32878
published_at 2026-04-16T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32856
published_at 2026-04-18T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32964
published_at 2026-04-02T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32999
published_at 2026-04-04T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32822
published_at 2026-04-07T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32869
published_at 2026-04-08T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32898
published_at 2026-04-09T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21055
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275444
reference_id 2275444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275444
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
5
reference_url https://security.netapp.com/advisory/ntap-20240426-0011/
reference_id ntap-20240426-0011
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/
url https://security.netapp.com/advisory/ntap-20240426-0011/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21055
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hyn3-nyeu-8bdw
50
url VCID-j5dm-qp9g-uygv
vulnerability_id VCID-j5dm-qp9g-uygv
summary mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21061
reference_id
reference_type
scores
0
value 0.00154
scoring_system epss
scoring_elements 0.36142
published_at 2026-04-21T12:55:00Z
1
value 0.00154
scoring_system epss
scoring_elements 0.36193
published_at 2026-04-12T12:55:00Z
2
value 0.00154
scoring_system epss
scoring_elements 0.36168
published_at 2026-04-13T12:55:00Z
3
value 0.00154
scoring_system epss
scoring_elements 0.36209
published_at 2026-04-16T12:55:00Z
4
value 0.00154
scoring_system epss
scoring_elements 0.36194
published_at 2026-04-18T12:55:00Z
5
value 0.00154
scoring_system epss
scoring_elements 0.3629
published_at 2026-04-02T12:55:00Z
6
value 0.00154
scoring_system epss
scoring_elements 0.36323
published_at 2026-04-04T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.36157
published_at 2026-04-07T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.36207
published_at 2026-04-08T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.36225
published_at 2026-04-09T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.3623
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21061
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275448
reference_id 2275448
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275448
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*
5
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0014/
reference_id ntap-20240426-0014
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/
url https://security.netapp.com/advisory/ntap-20240426-0014/
7
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
8
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
9
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21061
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j5dm-qp9g-uygv
51
url VCID-jhke-e5qv-dua9
vulnerability_id VCID-jhke-e5qv-dua9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20966
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44325
published_at 2026-04-21T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44405
published_at 2026-04-16T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44396
published_at 2026-04-18T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.4435
published_at 2026-04-12T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44372
published_at 2026-04-04T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44308
published_at 2026-04-07T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-08T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44365
published_at 2026-04-09T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44382
published_at 2026-04-11T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44349
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20966
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258777
reference_id 2258777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258777
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20966
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jhke-e5qv-dua9
52
url VCID-jzd8-k3th-6uc1
vulnerability_id VCID-jzd8-k3th-6uc1
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22066.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22066
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22066
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245018
reference_id 2245018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245018
4
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:26Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22066
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzd8-k3th-6uc1
53
url VCID-khzk-mgcw-3ff6
vulnerability_id VCID-khzk-mgcw-3ff6
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21945.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21945
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-02T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30852
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31054
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3093
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30876
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30887
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21945
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188120
reference_id 2188120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188120
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21945
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-khzk-mgcw-3ff6
54
url VCID-knap-u7y6-duhy
vulnerability_id VCID-knap-u7y6-duhy
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20977
reference_id
reference_type
scores
0
value 0.00244
scoring_system epss
scoring_elements 0.47702
published_at 2026-04-21T12:55:00Z
1
value 0.00244
scoring_system epss
scoring_elements 0.47691
published_at 2026-04-12T12:55:00Z
2
value 0.00244
scoring_system epss
scoring_elements 0.47701
published_at 2026-04-13T12:55:00Z
3
value 0.00244
scoring_system epss
scoring_elements 0.47756
published_at 2026-04-16T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47749
published_at 2026-04-18T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.4767
published_at 2026-04-02T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.4769
published_at 2026-04-09T12:55:00Z
7
value 0.00244
scoring_system epss
scoring_elements 0.4764
published_at 2026-04-07T12:55:00Z
8
value 0.00244
scoring_system epss
scoring_elements 0.47695
published_at 2026-04-08T12:55:00Z
9
value 0.00244
scoring_system epss
scoring_elements 0.47714
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20977
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258788
reference_id 2258788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258788
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:39:04Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20977
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-knap-u7y6-duhy
55
url VCID-kvrm-v55z-q7gh
vulnerability_id VCID-kvrm-v55z-q7gh
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22046.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22046
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13794
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13645
published_at 2026-04-21T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13851
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.1365
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13732
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13782
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13751
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13713
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13663
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13575
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13572
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22046
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224216
reference_id 2224216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224216
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22046
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kvrm-v55z-q7gh
56
url VCID-mydc-k3wq-bkc2
vulnerability_id VCID-mydc-k3wq-bkc2
summary mysql: Server: Partition unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21953.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21953
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21953
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188123
reference_id 2188123
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188123
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21953
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mydc-k3wq-bkc2
57
url VCID-n2yw-1gc2-jqgf
vulnerability_id VCID-n2yw-1gc2-jqgf
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21056.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21056
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27986
published_at 2026-04-21T12:55:00Z
1
value 0.00154
scoring_system epss
scoring_elements 0.36209
published_at 2026-04-16T12:55:00Z
2
value 0.00154
scoring_system epss
scoring_elements 0.36168
published_at 2026-04-13T12:55:00Z
3
value 0.00154
scoring_system epss
scoring_elements 0.36194
published_at 2026-04-18T12:55:00Z
4
value 0.00154
scoring_system epss
scoring_elements 0.3629
published_at 2026-04-02T12:55:00Z
5
value 0.00154
scoring_system epss
scoring_elements 0.36323
published_at 2026-04-04T12:55:00Z
6
value 0.00154
scoring_system epss
scoring_elements 0.36157
published_at 2026-04-07T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.36207
published_at 2026-04-08T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.36225
published_at 2026-04-09T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.3623
published_at 2026-04-11T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.36193
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21056
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275445
reference_id 2275445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275445
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:43:27Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
5
reference_url https://security.netapp.com/advisory/ntap-20240426-0012/
reference_id ntap-20240426-0012
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:43:27Z/
url https://security.netapp.com/advisory/ntap-20240426-0012/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21056
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2yw-1gc2-jqgf
58
url VCID-nc2b-kkpu-1kac
vulnerability_id VCID-nc2b-kkpu-1kac
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22068.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22068
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07514
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07536
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07595
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07614
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07613
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.076
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07586
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07511
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07499
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07639
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22068
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245019
reference_id 2245019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245019
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22068
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nc2b-kkpu-1kac
59
url VCID-ngqt-qntm-hugw
vulnerability_id VCID-ngqt-qntm-hugw
summary mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21947.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21947
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21947
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188122
reference_id 2188122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188122
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21947
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngqt-qntm-hugw
60
url VCID-njfq-ur78-bqgs
vulnerability_id VCID-njfq-ur78-bqgs
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22005.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22005.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22005
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13564
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13429
published_at 2026-04-21T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13626
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13424
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13505
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13554
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13527
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.1349
published_at 2026-04-12T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13444
published_at 2026-04-13T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13356
published_at 2026-04-16T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13354
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22005
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224211
reference_id 2224211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224211
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22005
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njfq-ur78-bqgs
61
url VCID-p56t-h63z-9yhb
vulnerability_id VCID-p56t-h63z-9yhb
summary mysql: Server: DDL unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22058.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22058
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35715
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35612
published_at 2026-04-21T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35741
published_at 2026-04-04T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35622
published_at 2026-04-07T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35668
published_at 2026-04-08T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35691
published_at 2026-04-09T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.357
published_at 2026-04-11T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35656
published_at 2026-04-12T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35633
published_at 2026-04-13T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35673
published_at 2026-04-16T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35663
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22058
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224222
reference_id 2224222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224222
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22058
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p56t-h63z-9yhb
62
url VCID-pe84-64en-63dk
vulnerability_id VCID-pe84-64en-63dk
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22057.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22057
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.18053
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.1787
published_at 2026-04-21T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18108
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17809
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17897
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17958
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17974
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17929
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.1788
published_at 2026-04-13T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17823
published_at 2026-04-16T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17833
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22057
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224221
reference_id 2224221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224221
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22057
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pe84-64en-63dk
63
url VCID-prbq-dh9s-bqas
vulnerability_id VCID-prbq-dh9s-bqas
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21911.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21911
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21911
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188109
reference_id 2188109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188109
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21911
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prbq-dh9s-bqas
64
url VCID-qt3k-tebq-7fhr
vulnerability_id VCID-qt3k-tebq-7fhr
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22054.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22054
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13564
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13429
published_at 2026-04-21T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13626
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13424
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13505
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13554
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13527
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.1349
published_at 2026-04-12T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13444
published_at 2026-04-13T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13356
published_at 2026-04-16T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13354
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22054
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224219
reference_id 2224219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224219
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22054
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qt3k-tebq-7fhr
65
url VCID-r7r8-ucgm-judb
vulnerability_id VCID-r7r8-ucgm-judb
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20961
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.6459
published_at 2026-04-21T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.64587
published_at 2026-04-12T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64558
published_at 2026-04-13T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.64592
published_at 2026-04-16T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64604
published_at 2026-04-18T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64531
published_at 2026-04-02T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.6456
published_at 2026-04-04T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.64518
published_at 2026-04-07T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64567
published_at 2026-04-08T12:55:00Z
9
value 0.0047
scoring_system epss
scoring_elements 0.64583
published_at 2026-04-09T12:55:00Z
10
value 0.0047
scoring_system epss
scoring_elements 0.64599
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20961
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258772
reference_id 2258772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258772
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:53:34Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20961
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7r8-ucgm-judb
66
url VCID-rt2r-64y1-8yhg
vulnerability_id VCID-rt2r-64y1-8yhg
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22008.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22008
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13794
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13645
published_at 2026-04-21T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13851
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.1365
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13732
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13782
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13751
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13713
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13663
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13575
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13572
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22008
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224213
reference_id 2224213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224213
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22008
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rt2r-64y1-8yhg
67
url VCID-rxn5-5rba-fkhd
vulnerability_id VCID-rxn5-5rba-fkhd
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22078.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22078
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07514
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07639
published_at 2026-04-21T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.076
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07586
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07511
published_at 2026-04-16T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07499
published_at 2026-04-18T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07536
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07595
published_at 2026-04-08T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07614
published_at 2026-04-09T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07613
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22078
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245021
reference_id 2245021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245021
4
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-05T16:23:53Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22078
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rxn5-5rba-fkhd
68
url VCID-sm6e-jgke-g7cb
vulnerability_id VCID-sm6e-jgke-g7cb
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20963
reference_id
reference_type
scores
0
value 0.00402
scoring_system epss
scoring_elements 0.60853
published_at 2026-04-21T12:55:00Z
1
value 0.00402
scoring_system epss
scoring_elements 0.60841
published_at 2026-04-12T12:55:00Z
2
value 0.00402
scoring_system epss
scoring_elements 0.60822
published_at 2026-04-13T12:55:00Z
3
value 0.00402
scoring_system epss
scoring_elements 0.60864
published_at 2026-04-16T12:55:00Z
4
value 0.00402
scoring_system epss
scoring_elements 0.60869
published_at 2026-04-18T12:55:00Z
5
value 0.00402
scoring_system epss
scoring_elements 0.60775
published_at 2026-04-02T12:55:00Z
6
value 0.00402
scoring_system epss
scoring_elements 0.60804
published_at 2026-04-04T12:55:00Z
7
value 0.00402
scoring_system epss
scoring_elements 0.60768
published_at 2026-04-07T12:55:00Z
8
value 0.00402
scoring_system epss
scoring_elements 0.60817
published_at 2026-04-08T12:55:00Z
9
value 0.00402
scoring_system epss
scoring_elements 0.60833
published_at 2026-04-09T12:55:00Z
10
value 0.00402
scoring_system epss
scoring_elements 0.60854
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20963
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258774
reference_id 2258774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258774
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:25Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20963
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sm6e-jgke-g7cb
69
url VCID-tn1d-ppx8-23ea
vulnerability_id VCID-tn1d-ppx8-23ea
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21057
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30488
published_at 2026-04-21T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30543
published_at 2026-04-16T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30524
published_at 2026-04-18T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30653
published_at 2026-04-02T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30699
published_at 2026-04-04T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30511
published_at 2026-04-07T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.3057
published_at 2026-04-08T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30605
published_at 2026-04-09T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-11T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30564
published_at 2026-04-12T12:55:00Z
10
value 0.00117
scoring_system epss
scoring_elements 0.30517
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21057
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275446
reference_id 2275446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275446
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T16:11:19Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21057
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tn1d-ppx8-23ea
70
url VCID-trty-bd23-6yej
vulnerability_id VCID-trty-bd23-6yej
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21051.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21051.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21051
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.3282
published_at 2026-04-21T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-12T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32836
published_at 2026-04-13T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32878
published_at 2026-04-16T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32856
published_at 2026-04-18T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32964
published_at 2026-04-02T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32999
published_at 2026-04-04T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32822
published_at 2026-04-07T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32869
published_at 2026-04-08T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32898
published_at 2026-04-09T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21051
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275439
reference_id 2275439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275439
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:56:12Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
5
reference_url https://security.netapp.com/advisory/ntap-20240426-0012/
reference_id ntap-20240426-0012
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:56:12Z/
url https://security.netapp.com/advisory/ntap-20240426-0012/
6
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
7
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
8
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21051
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trty-bd23-6yej
71
url VCID-ttph-u92a-z3cx
vulnerability_id VCID-ttph-u92a-z3cx
summary mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20969
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32779
published_at 2026-04-21T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32819
published_at 2026-04-12T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32794
published_at 2026-04-13T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32837
published_at 2026-04-16T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32814
published_at 2026-04-18T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32923
published_at 2026-04-02T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32958
published_at 2026-04-04T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.3278
published_at 2026-04-07T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32827
published_at 2026-04-08T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32856
published_at 2026-04-09T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32858
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20969
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258780
reference_id 2258780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258780
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T19:54:38Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20969
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ttph-u92a-z3cx
72
url VCID-tv8p-rmhf-1ucm
vulnerability_id VCID-tv8p-rmhf-1ucm
summary mysql: Server: Replication unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20967
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19294
published_at 2026-04-21T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.1937
published_at 2026-04-12T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19313
published_at 2026-04-13T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19275
published_at 2026-04-16T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19284
published_at 2026-04-18T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19518
published_at 2026-04-02T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19565
published_at 2026-04-04T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19283
published_at 2026-04-07T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19361
published_at 2026-04-08T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19413
published_at 2026-04-09T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19418
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20967
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258778
reference_id 2258778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258778
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:21Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20967
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tv8p-rmhf-1ucm
73
url VCID-u2pn-bks7-syhq
vulnerability_id VCID-u2pn-bks7-syhq
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20976
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44325
published_at 2026-04-21T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44405
published_at 2026-04-16T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44396
published_at 2026-04-18T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.4435
published_at 2026-04-12T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44372
published_at 2026-04-04T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44308
published_at 2026-04-07T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-08T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44365
published_at 2026-04-09T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44382
published_at 2026-04-11T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44349
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20976
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258787
reference_id 2258787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258787
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20976
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u2pn-bks7-syhq
74
url VCID-ucd7-7329-7qdm
vulnerability_id VCID-ucd7-7329-7qdm
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20982
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40344
published_at 2026-04-21T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.4045
published_at 2026-04-16T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40419
published_at 2026-04-18T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40427
published_at 2026-04-02T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40453
published_at 2026-04-04T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40377
published_at 2026-04-07T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40428
published_at 2026-04-08T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40439
published_at 2026-04-09T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.4046
published_at 2026-04-11T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40421
published_at 2026-04-12T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40402
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20982
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258791
reference_id 2258791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258791
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20982
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucd7-7329-7qdm
75
url VCID-v13a-j6tv-bfd1
vulnerability_id VCID-v13a-j6tv-bfd1
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21015.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21015
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.34146
published_at 2026-04-21T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36077
published_at 2026-04-18T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36115
published_at 2026-04-11T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36051
published_at 2026-04-13T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36176
published_at 2026-04-02T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36206
published_at 2026-04-04T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36041
published_at 2026-04-07T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36091
published_at 2026-04-16T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36109
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21015
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2275435
reference_id 2275435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2275435
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*
5
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-15T15:58:46Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0010/
reference_id ntap-20240426-0010
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-15T15:58:46Z/
url https://security.netapp.com/advisory/ntap-20240426-0010/
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2024-21015
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v13a-j6tv-bfd1
76
url VCID-v6r4-jmvd-1fg4
vulnerability_id VCID-v6r4-jmvd-1fg4
summary mysql: Server: DML unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20983.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20983.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20983
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34793
published_at 2026-04-21T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34839
published_at 2026-04-12T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34815
published_at 2026-04-13T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34853
published_at 2026-04-16T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34837
published_at 2026-04-18T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34893
published_at 2026-04-02T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34921
published_at 2026-04-04T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34799
published_at 2026-04-07T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34844
published_at 2026-04-08T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34873
published_at 2026-04-09T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34877
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20983
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258792
reference_id 2258792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258792
3
reference_url https://security.netapp.com/advisory/ntap-20240201-0009/
reference_id ntap-20240201-0009
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:42:23Z/
url https://security.netapp.com/advisory/ntap-20240201-0009/
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20983
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6r4-jmvd-1fg4
77
url VCID-vsrg-uyjf-6ycj
vulnerability_id VCID-vsrg-uyjf-6ycj
summary
zstd vulnerable to buffer overrun
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4899.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4899.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4899
reference_id
reference_type
scores
0
value 0.00219
scoring_system epss
scoring_elements 0.44558
published_at 2026-04-13T12:55:00Z
1
value 0.00219
scoring_system epss
scoring_elements 0.44614
published_at 2026-04-16T12:55:00Z
2
value 0.00219
scoring_system epss
scoring_elements 0.44557
published_at 2026-04-12T12:55:00Z
3
value 0.00219
scoring_system epss
scoring_elements 0.44586
published_at 2026-04-11T12:55:00Z
4
value 0.00219
scoring_system epss
scoring_elements 0.44569
published_at 2026-04-09T12:55:00Z
5
value 0.00219
scoring_system epss
scoring_elements 0.44564
published_at 2026-04-08T12:55:00Z
6
value 0.00219
scoring_system epss
scoring_elements 0.44514
published_at 2026-04-07T12:55:00Z
7
value 0.00219
scoring_system epss
scoring_elements 0.44574
published_at 2026-04-04T12:55:00Z
8
value 0.00219
scoring_system epss
scoring_elements 0.44553
published_at 2026-04-02T12:55:00Z
9
value 0.00255
scoring_system epss
scoring_elements 0.48862
published_at 2026-04-18T12:55:00Z
10
value 0.00255
scoring_system epss
scoring_elements 0.48822
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4899
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4899
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/facebook/zstd
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/facebook/zstd
5
reference_url https://github.com/facebook/zstd/issues/3200
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T17:23:19Z/
url https://github.com/facebook/zstd/issues/3200
6
reference_url https://github.com/facebook/zstd/pull/3220
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/facebook/zstd/pull/3220
7
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/zstd/PYSEC-2023-121.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/zstd/PYSEC-2023-121.yaml
8
reference_url https://github.com/sergey-dryabzhinsky/python-zstd/commit/c8a619aebdbd6b838fbfef6e19325a70f631a4c6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sergey-dryabzhinsky/python-zstd/commit/c8a619aebdbd6b838fbfef6e19325a70f631a4c6
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
12
reference_url https://security.netapp.com/advisory/ntap-20230725-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20230725-0005
13
reference_url https://security.netapp.com/advisory/ntap-20230725-0005/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T17:23:19Z/
url https://security.netapp.com/advisory/ntap-20230725-0005/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179864
reference_id 2179864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179864
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T17:23:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-4899
reference_id CVE-2022-4899
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-4899
17
reference_url https://github.com/advisories/GHSA-5c9c-6x87-f9vm
reference_id GHSA-5c9c-6x87-f9vm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5c9c-6x87-f9vm
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T17:23:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T17:23:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
20
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
21
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
22
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2022-4899, GHSA-5c9c-6x87-f9vm, PYSEC-2023-121
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsrg-uyjf-6ycj
78
url VCID-vwms-568k-gfe1
vulnerability_id VCID-vwms-568k-gfe1
summary mysql: Client programs unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21980.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21980.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21980
reference_id
reference_type
scores
0
value 0.00375
scoring_system epss
scoring_elements 0.59091
published_at 2026-04-02T12:55:00Z
1
value 0.00375
scoring_system epss
scoring_elements 0.59135
published_at 2026-04-21T12:55:00Z
2
value 0.00375
scoring_system epss
scoring_elements 0.59132
published_at 2026-04-09T12:55:00Z
3
value 0.00375
scoring_system epss
scoring_elements 0.5915
published_at 2026-04-16T12:55:00Z
4
value 0.00375
scoring_system epss
scoring_elements 0.59133
published_at 2026-04-12T12:55:00Z
5
value 0.00375
scoring_system epss
scoring_elements 0.59155
published_at 2026-04-18T12:55:00Z
6
value 0.00375
scoring_system epss
scoring_elements 0.59114
published_at 2026-04-13T12:55:00Z
7
value 0.00375
scoring_system epss
scoring_elements 0.59078
published_at 2026-04-07T12:55:00Z
8
value 0.00375
scoring_system epss
scoring_elements 0.59129
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21980
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188131
reference_id 2188131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188131
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-16T14:25:03Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
9
reference_url https://usn.ubuntu.com/6060-2/
reference_id USN-6060-2
reference_type
scores
url https://usn.ubuntu.com/6060-2/
fixed_packages
aliases CVE-2023-21980
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwms-568k-gfe1
79
url VCID-w89v-ws3n-6bgj
vulnerability_id VCID-w89v-ws3n-6bgj
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22038.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22038.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22038
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10987
published_at 2026-04-02T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10946
published_at 2026-04-21T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.1105
published_at 2026-04-04T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-07T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10949
published_at 2026-04-08T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11003
published_at 2026-04-09T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11007
published_at 2026-04-11T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-12T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10951
published_at 2026-04-13T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10816
published_at 2026-04-16T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10829
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22038
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224215
reference_id 2224215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224215
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6288-1/
reference_id USN-6288-1
reference_type
scores
url https://usn.ubuntu.com/6288-1/
fixed_packages
aliases CVE-2023-22038
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w89v-ws3n-6bgj
80
url VCID-wvmj-yphj-2ybt
vulnerability_id VCID-wvmj-yphj-2ybt
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20964
reference_id
reference_type
scores
0
value 0.00325
scoring_system epss
scoring_elements 0.55552
published_at 2026-04-18T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.55513
published_at 2026-04-13T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55549
published_at 2026-04-16T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.55488
published_at 2026-04-02T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55512
published_at 2026-04-04T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55489
published_at 2026-04-07T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.5554
published_at 2026-04-08T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55541
published_at 2026-04-09T12:55:00Z
8
value 0.00325
scoring_system epss
scoring_elements 0.55551
published_at 2026-04-11T12:55:00Z
9
value 0.00325
scoring_system epss
scoring_elements 0.5553
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20964
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258775
reference_id 2258775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258775
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20964
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wvmj-yphj-2ybt
81
url VCID-x695-8ykr-cffs
vulnerability_id VCID-x695-8ykr-cffs
summary mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-20981
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37243
published_at 2026-04-21T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37295
published_at 2026-04-12T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37267
published_at 2026-04-13T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37314
published_at 2026-04-16T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.37296
published_at 2026-04-18T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37401
published_at 2026-04-02T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37426
published_at 2026-04-04T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37254
published_at 2026-04-07T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37305
published_at 2026-04-08T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.37317
published_at 2026-04-09T12:55:00Z
10
value 0.00163
scoring_system epss
scoring_elements 0.37329
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-20981
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
reference_id 1061126
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258790
reference_id 2258790
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2258790
4
reference_url https://security.netapp.com/advisory/ntap-20240201-0003/
reference_id ntap-20240201-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:56:05Z/
url https://security.netapp.com/advisory/ntap-20240201-0003/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6615-1/
reference_id USN-6615-1
reference_type
scores
url https://usn.ubuntu.com/6615-1/
fixed_packages
aliases CVE-2024-20981
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x695-8ykr-cffs
82
url VCID-xs7y-us9k-kycg
vulnerability_id VCID-xs7y-us9k-kycg
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21972.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21972.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21972
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13124
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.12985
published_at 2026-04-21T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13037
published_at 2026-04-12T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.12987
published_at 2026-04-13T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.12883
published_at 2026-04-16T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.12885
published_at 2026-04-18T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13178
published_at 2026-04-04T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.12977
published_at 2026-04-07T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13055
published_at 2026-04-08T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13106
published_at 2026-04-09T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13075
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21972
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188128
reference_id 2188128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188128
4
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:44Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
5
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
6
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
7
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
8
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21972
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xs7y-us9k-kycg
83
url VCID-xwtb-h96c-kydx
vulnerability_id VCID-xwtb-h96c-kydx
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22113.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22113.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22113
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06684
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06862
published_at 2026-04-21T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06787
published_at 2026-04-12T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06781
published_at 2026-04-13T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06712
published_at 2026-04-16T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06702
published_at 2026-04-18T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06727
published_at 2026-04-04T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06711
published_at 2026-04-07T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06762
published_at 2026-04-08T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06795
published_at 2026-04-09T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06794
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22113
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245032
reference_id 2245032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245032
3
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T15:06:18Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
fixed_packages
aliases CVE-2023-22113
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwtb-h96c-kydx
84
url VCID-yd9z-3fwe-vfba
vulnerability_id VCID-yd9z-3fwe-vfba
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22092.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22092.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22092
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20985
published_at 2026-04-04T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20775
published_at 2026-04-08T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-09T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20748
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-18T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22092
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
reference_id 1055034
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245024
reference_id 2245024
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245024
4
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
5
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
6
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
7
reference_url https://usn.ubuntu.com/6459-1/
reference_id USN-6459-1
reference_type
scores
url https://usn.ubuntu.com/6459-1/
fixed_packages
aliases CVE-2023-22092
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yd9z-3fwe-vfba
85
url VCID-z4a8-r35u-kqdn
vulnerability_id VCID-z4a8-r35u-kqdn
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21919.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21919
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30744
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30585
published_at 2026-04-21T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30792
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30608
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30698
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30703
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30657
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30612
published_at 2026-04-13T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-16T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21919
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
reference_id 1034719
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188113
reference_id 2188113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188113
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
reference_id C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
reference_id JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
6
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
reference_id QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
8
reference_url https://access.redhat.com/errata/RHSA-2024:0894
reference_id RHSA-2024:0894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0894
9
reference_url https://access.redhat.com/errata/RHSA-2024:1141
reference_id RHSA-2024:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1141
10
reference_url https://access.redhat.com/errata/RHSA-2024:2619
reference_id RHSA-2024:2619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2619
11
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
fixed_packages
aliases CVE-2023-21919
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4a8-r35u-kqdn
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql80-mysql@8.0.36-1%3Farch=el7