Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-mysql80-mysql@8.0.30-1?arch=el7
Typerpm
Namespaceredhat
Namerh-mysql80-mysql
Version8.0.30-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-129c-q69g-nkbu
vulnerability_id VCID-129c-q69g-nkbu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35636
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35636
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016124
reference_id 2016124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016124
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:13Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35636
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-129c-q69g-nkbu
1
url VCID-13v8-wt9t-8kcs
vulnerability_id VCID-13v8-wt9t-8kcs
summary mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21362
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21362
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043641
reference_id 2043641
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043641
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:11Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21362
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13v8-wt9t-8kcs
2
url VCID-1748-hmbg-hbhk
vulnerability_id VCID-1748-hmbg-hbhk
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35628
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35628
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016114
reference_id 2016114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016114
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:21Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35628
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1748-hmbg-hbhk
3
url VCID-259b-q1uk-vyap
vulnerability_id VCID-259b-q1uk-vyap
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35646
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35646
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016135
reference_id 2016135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016135
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:03Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35646
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-259b-q1uk-vyap
4
url VCID-2jks-ehmr-73aj
vulnerability_id VCID-2jks-ehmr-73aj
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21534
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60318
published_at 2026-04-21T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63368
published_at 2026-04-09T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63385
published_at 2026-04-11T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-12T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63332
published_at 2026-04-13T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-16T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63373
published_at 2026-04-18T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-04T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63299
published_at 2026-04-07T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.6335
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21534
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115294
reference_id 2115294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115294
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21534
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jks-ehmr-73aj
5
url VCID-34tb-1r12-kbe9
vulnerability_id VCID-34tb-1r12-kbe9
summary mysql: C API unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35597
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.71378
published_at 2026-04-01T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71386
published_at 2026-04-02T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71452
published_at 2026-04-21T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71404
published_at 2026-04-04T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71379
published_at 2026-04-07T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.7142
published_at 2026-04-08T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71432
published_at 2026-04-09T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71454
published_at 2026-04-11T12:55:00Z
8
value 0.00674
scoring_system epss
scoring_elements 0.71438
published_at 2026-04-12T12:55:00Z
9
value 0.00674
scoring_system epss
scoring_elements 0.71421
published_at 2026-04-13T12:55:00Z
10
value 0.00674
scoring_system epss
scoring_elements 0.71467
published_at 2026-04-16T12:55:00Z
11
value 0.00674
scoring_system epss
scoring_elements 0.71472
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35597
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016099
reference_id 2016099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016099
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0005/
reference_id ntap-20211022-0005
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/
url https://security.netapp.com/advisory/ntap-20211022-0005/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35597
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34tb-1r12-kbe9
6
url VCID-35tu-zc9b-j7dd
vulnerability_id VCID-35tu-zc9b-j7dd
summary mysql: Server: GIS unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35631
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35631
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016118
reference_id 2016118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016118
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:18Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35631
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35tu-zc9b-j7dd
7
url VCID-36fa-z98h-3yfk
vulnerability_id VCID-36fa-z98h-3yfk
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35604
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.42962
published_at 2026-04-01T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43022
published_at 2026-04-13T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43004
published_at 2026-04-21T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43049
published_at 2026-04-09T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.42986
published_at 2026-04-07T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43036
published_at 2026-04-08T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43071
published_at 2026-04-11T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43037
published_at 2026-04-12T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.4308
published_at 2026-04-16T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43068
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016101
reference_id 2016101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016101
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
7
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
9
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
10
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
11
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
12
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
13
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
14
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
15
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
17
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
18
reference_url https://usn.ubuntu.com/5123-2/
reference_id USN-5123-2
reference_type
scores
url https://usn.ubuntu.com/5123-2/
19
reference_url https://usn.ubuntu.com/5170-1/
reference_id USN-5170-1
reference_type
scores
url https://usn.ubuntu.com/5170-1/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35604
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk
8
url VCID-39ju-7pvp-hqbv
vulnerability_id VCID-39ju-7pvp-hqbv
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21278
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-02T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62487
published_at 2026-04-18T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62469
published_at 2026-04-21T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62459
published_at 2026-04-12T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62436
published_at 2026-04-13T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.6248
published_at 2026-04-16T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62419
published_at 2026-04-04T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62385
published_at 2026-04-07T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62433
published_at 2026-04-08T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.6245
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21278
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043628
reference_id 2043628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043628
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:49Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21278
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39ju-7pvp-hqbv
9
url VCID-3kv6-pbgg-c3au
vulnerability_id VCID-3kv6-pbgg-c3au
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35635
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35635
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016122
reference_id 2016122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016122
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:14Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35635
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3kv6-pbgg-c3au
10
url VCID-3qju-u4f8-6ybw
vulnerability_id VCID-3qju-u4f8-6ybw
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35645
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35645
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016134
reference_id 2016134
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016134
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:04Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35645
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qju-u4f8-6ybw
11
url VCID-3w7d-u3hs-x7fr
vulnerability_id VCID-3w7d-u3hs-x7fr
summary mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21455
reference_id
reference_type
scores
0
value 0.00325
scoring_system epss
scoring_elements 0.5547
published_at 2026-04-02T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.55525
published_at 2026-04-08T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55535
published_at 2026-04-11T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.55514
published_at 2026-04-12T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55497
published_at 2026-04-13T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55534
published_at 2026-04-16T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.55537
published_at 2026-04-18T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55495
published_at 2026-04-04T12:55:00Z
8
value 0.00325
scoring_system epss
scoring_elements 0.55474
published_at 2026-04-07T12:55:00Z
9
value 0.00325
scoring_system epss
scoring_elements 0.55526
published_at 2026-04-09T12:55:00Z
10
value 0.00359
scoring_system epss
scoring_elements 0.58083
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21455
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115282
reference_id 2115282
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115282
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21455
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3w7d-u3hs-x7fr
12
url VCID-3zjk-18aa-9kbk
vulnerability_id VCID-3zjk-18aa-9kbk
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21413
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54214
published_at 2026-04-02T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54302
published_at 2026-04-21T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54317
published_at 2026-04-16T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54299
published_at 2026-04-12T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54278
published_at 2026-04-13T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54322
published_at 2026-04-18T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-04T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-07T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-08T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21413
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082637
reference_id 2082637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082637
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:40Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21413
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3zjk-18aa-9kbk
13
url VCID-4d3p-r6am-xucc
vulnerability_id VCID-4d3p-r6am-xucc
summary mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35623
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29549
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29616
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29437
published_at 2026-04-21T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29544
published_at 2026-04-12T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29491
published_at 2026-04-13T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.2951
published_at 2026-04-16T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29483
published_at 2026-04-18T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29665
published_at 2026-04-04T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29486
published_at 2026-04-07T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29587
published_at 2026-04-09T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29589
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35623
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016109
reference_id 2016109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016109
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:26Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35623
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4d3p-r6am-xucc
14
url VCID-4dc2-2bx4-uke7
vulnerability_id VCID-4dc2-2bx4-uke7
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21303
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-02T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51346
published_at 2026-04-21T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51256
published_at 2026-04-07T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51311
published_at 2026-04-08T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51308
published_at 2026-04-09T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51351
published_at 2026-04-11T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51331
published_at 2026-04-12T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-13T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51359
published_at 2026-04-16T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-18T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21303
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043632
reference_id 2043632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043632
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
9
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
aliases CVE-2022-21303
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4dc2-2bx4-uke7
15
url VCID-4jnd-s39x-a3e5
vulnerability_id VCID-4jnd-s39x-a3e5
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35638
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60637
published_at 2026-04-01T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60711
published_at 2026-04-02T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60809
published_at 2026-04-18T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60794
published_at 2026-04-21T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.6078
published_at 2026-04-12T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-13T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60804
published_at 2026-04-16T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.6074
published_at 2026-04-04T12:55:00Z
8
value 0.00401
scoring_system epss
scoring_elements 0.60706
published_at 2026-04-07T12:55:00Z
9
value 0.00401
scoring_system epss
scoring_elements 0.60755
published_at 2026-04-08T12:55:00Z
10
value 0.00401
scoring_system epss
scoring_elements 0.6077
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35638
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016127
reference_id 2016127
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016127
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:11Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35638
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jnd-s39x-a3e5
16
url VCID-4wes-5yrc-wkcc
vulnerability_id VCID-4wes-5yrc-wkcc
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35641
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35641
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016130
reference_id 2016130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016130
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:08Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35641
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wes-5yrc-wkcc
17
url VCID-5587-7c63-xfgg
vulnerability_id VCID-5587-7c63-xfgg
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21517
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.35033
published_at 2026-04-02T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.3506
published_at 2026-04-04T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.3494
published_at 2026-04-07T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.34985
published_at 2026-04-08T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35014
published_at 2026-04-09T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35018
published_at 2026-04-11T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.34982
published_at 2026-04-12T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34958
published_at 2026-04-13T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.34997
published_at 2026-04-16T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34981
published_at 2026-04-18T12:55:00Z
10
value 0.00386
scoring_system epss
scoring_elements 0.59805
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21517
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115285
reference_id 2115285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115285
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
reference_id 3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21517
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5587-7c63-xfgg
18
url VCID-5hjv-8tfx-ckbx
vulnerability_id VCID-5hjv-8tfx-ckbx
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35634
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35634
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016121
reference_id 2016121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016121
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:15Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35634
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjv-8tfx-ckbx
19
url VCID-5ufm-419u-2qg3
vulnerability_id VCID-5ufm-419u-2qg3
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21351
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-02T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62487
published_at 2026-04-18T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62469
published_at 2026-04-21T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62459
published_at 2026-04-12T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62436
published_at 2026-04-13T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.6248
published_at 2026-04-16T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62419
published_at 2026-04-04T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62385
published_at 2026-04-07T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62433
published_at 2026-04-08T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.6245
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21351
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043638
reference_id 2043638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043638
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:20Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21351
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ufm-419u-2qg3
20
url VCID-68eb-ae7g-tbcj
vulnerability_id VCID-68eb-ae7g-tbcj
summary mysql: Server: Parser unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21304
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-02T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51346
published_at 2026-04-21T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51256
published_at 2026-04-07T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51311
published_at 2026-04-08T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51308
published_at 2026-04-09T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51351
published_at 2026-04-11T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51331
published_at 2026-04-12T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-13T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51359
published_at 2026-04-16T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-18T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21304
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043633
reference_id 2043633
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043633
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
9
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
aliases CVE-2022-21304
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68eb-ae7g-tbcj
21
url VCID-69yx-qkan-d7d4
vulnerability_id VCID-69yx-qkan-d7d4
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21600
reference_id
reference_type
scores
0
value 0.01312
scoring_system epss
scoring_elements 0.79768
published_at 2026-04-02T12:55:00Z
1
value 0.01312
scoring_system epss
scoring_elements 0.79842
published_at 2026-04-21T12:55:00Z
2
value 0.01312
scoring_system epss
scoring_elements 0.79818
published_at 2026-04-12T12:55:00Z
3
value 0.01312
scoring_system epss
scoring_elements 0.7981
published_at 2026-04-13T12:55:00Z
4
value 0.01312
scoring_system epss
scoring_elements 0.79838
published_at 2026-04-16T12:55:00Z
5
value 0.01312
scoring_system epss
scoring_elements 0.79839
published_at 2026-04-18T12:55:00Z
6
value 0.01312
scoring_system epss
scoring_elements 0.79789
published_at 2026-04-04T12:55:00Z
7
value 0.01312
scoring_system epss
scoring_elements 0.79775
published_at 2026-04-07T12:55:00Z
8
value 0.01312
scoring_system epss
scoring_elements 0.79804
published_at 2026-04-08T12:55:00Z
9
value 0.01312
scoring_system epss
scoring_elements 0.79812
published_at 2026-04-09T12:55:00Z
10
value 0.01312
scoring_system epss
scoring_elements 0.79834
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21600
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142864
reference_id 2142864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142864
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T15:25:23Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21600
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69yx-qkan-d7d4
22
url VCID-6ufw-3gfn-5ygm
vulnerability_id VCID-6ufw-3gfn-5ygm
summary mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21605
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66835
published_at 2026-04-02T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66899
published_at 2026-04-21T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66901
published_at 2026-04-12T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66869
published_at 2026-04-13T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66902
published_at 2026-04-16T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66917
published_at 2026-04-18T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.66861
published_at 2026-04-04T12:55:00Z
7
value 0.00522
scoring_system epss
scoring_elements 0.66833
published_at 2026-04-07T12:55:00Z
8
value 0.00522
scoring_system epss
scoring_elements 0.66882
published_at 2026-04-08T12:55:00Z
9
value 0.00522
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-09T12:55:00Z
10
value 0.00522
scoring_system epss
scoring_elements 0.66915
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21605
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142866
reference_id 2142866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142866
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:10Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21605
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ufw-3gfn-5ygm
23
url VCID-7g35-wex8-dygz
vulnerability_id VCID-7g35-wex8-dygz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21866
reference_id
reference_type
scores
0
value 0.00436
scoring_system epss
scoring_elements 0.6299
published_at 2026-04-04T12:55:00Z
1
value 0.00436
scoring_system epss
scoring_elements 0.62962
published_at 2026-04-02T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65105
published_at 2026-04-21T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65112
published_at 2026-04-16T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.65121
published_at 2026-04-18T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65033
published_at 2026-04-07T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65082
published_at 2026-04-08T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65096
published_at 2026-04-09T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65114
published_at 2026-04-11T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65104
published_at 2026-04-12T12:55:00Z
10
value 0.0048
scoring_system epss
scoring_elements 0.65076
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21866
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162273
reference_id 2162273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162273
3
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
4
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2023-21866
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7g35-wex8-dygz
24
url VCID-7r77-wwtj-bbgs
vulnerability_id VCID-7r77-wwtj-bbgs
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21417
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59305
published_at 2026-04-02T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59361
published_at 2026-04-21T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59359
published_at 2026-04-12T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59341
published_at 2026-04-13T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59374
published_at 2026-04-16T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.5938
published_at 2026-04-18T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59328
published_at 2026-04-04T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59293
published_at 2026-04-07T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-08T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59356
published_at 2026-04-09T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59376
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21417
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082640
reference_id 2082640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082640
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:37Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
8
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
aliases CVE-2022-21417
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7r77-wwtj-bbgs
25
url VCID-7wzz-nva6-yqaz
vulnerability_id VCID-7wzz-nva6-yqaz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21528
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60318
published_at 2026-04-21T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63299
published_at 2026-04-07T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.6335
published_at 2026-04-08T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63368
published_at 2026-04-09T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63385
published_at 2026-04-11T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-12T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63332
published_at 2026-04-13T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-16T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63373
published_at 2026-04-18T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21528
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115290
reference_id 2115290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115290
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
reference_id 3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21528
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wzz-nva6-yqaz
26
url VCID-8fkf-84dd-7ya2
vulnerability_id VCID-8fkf-84dd-7ya2
summary mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21457
reference_id
reference_type
scores
0
value 0.01859
scoring_system epss
scoring_elements 0.82994
published_at 2026-04-02T12:55:00Z
1
value 0.01859
scoring_system epss
scoring_elements 0.83083
published_at 2026-04-21T12:55:00Z
2
value 0.01859
scoring_system epss
scoring_elements 0.83052
published_at 2026-04-11T12:55:00Z
3
value 0.01859
scoring_system epss
scoring_elements 0.83046
published_at 2026-04-12T12:55:00Z
4
value 0.01859
scoring_system epss
scoring_elements 0.83041
published_at 2026-04-13T12:55:00Z
5
value 0.01859
scoring_system epss
scoring_elements 0.8308
published_at 2026-04-18T12:55:00Z
6
value 0.01859
scoring_system epss
scoring_elements 0.83007
published_at 2026-04-04T12:55:00Z
7
value 0.01859
scoring_system epss
scoring_elements 0.83004
published_at 2026-04-07T12:55:00Z
8
value 0.01859
scoring_system epss
scoring_elements 0.83029
published_at 2026-04-08T12:55:00Z
9
value 0.01859
scoring_system epss
scoring_elements 0.83036
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21457
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082654
reference_id 2082654
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082654
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:03Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21457
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkf-84dd-7ya2
27
url VCID-8m18-147e-4ka4
vulnerability_id VCID-8m18-147e-4ka4
summary mysql: Server: Options unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35630
reference_id
reference_type
scores
0
value 0.00416
scoring_system epss
scoring_elements 0.6157
published_at 2026-04-01T12:55:00Z
1
value 0.00416
scoring_system epss
scoring_elements 0.61644
published_at 2026-04-02T12:55:00Z
2
value 0.00416
scoring_system epss
scoring_elements 0.61729
published_at 2026-04-21T12:55:00Z
3
value 0.00416
scoring_system epss
scoring_elements 0.61719
published_at 2026-04-12T12:55:00Z
4
value 0.00416
scoring_system epss
scoring_elements 0.61699
published_at 2026-04-13T12:55:00Z
5
value 0.00416
scoring_system epss
scoring_elements 0.6174
published_at 2026-04-16T12:55:00Z
6
value 0.00416
scoring_system epss
scoring_elements 0.61746
published_at 2026-04-18T12:55:00Z
7
value 0.00416
scoring_system epss
scoring_elements 0.61674
published_at 2026-04-04T12:55:00Z
8
value 0.00416
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-07T12:55:00Z
9
value 0.00416
scoring_system epss
scoring_elements 0.61694
published_at 2026-04-08T12:55:00Z
10
value 0.00416
scoring_system epss
scoring_elements 0.61709
published_at 2026-04-09T12:55:00Z
11
value 0.00416
scoring_system epss
scoring_elements 0.61731
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35630
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016117
reference_id 2016117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016117
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:19Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35630
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8m18-147e-4ka4
28
url VCID-8mnm-4cgf-2bbt
vulnerability_id VCID-8mnm-4cgf-2bbt
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21302
reference_id
reference_type
scores
0
value 0.00446
scoring_system epss
scoring_elements 0.63449
published_at 2026-04-02T12:55:00Z
1
value 0.00446
scoring_system epss
scoring_elements 0.63506
published_at 2026-04-21T12:55:00Z
2
value 0.00446
scoring_system epss
scoring_elements 0.63441
published_at 2026-04-07T12:55:00Z
3
value 0.00446
scoring_system epss
scoring_elements 0.63492
published_at 2026-04-08T12:55:00Z
4
value 0.00446
scoring_system epss
scoring_elements 0.6351
published_at 2026-04-09T12:55:00Z
5
value 0.00446
scoring_system epss
scoring_elements 0.63527
published_at 2026-04-11T12:55:00Z
6
value 0.00446
scoring_system epss
scoring_elements 0.63511
published_at 2026-04-12T12:55:00Z
7
value 0.00446
scoring_system epss
scoring_elements 0.63477
published_at 2026-04-13T12:55:00Z
8
value 0.00446
scoring_system epss
scoring_elements 0.63513
published_at 2026-04-16T12:55:00Z
9
value 0.00446
scoring_system epss
scoring_elements 0.6352
published_at 2026-04-18T12:55:00Z
10
value 0.00446
scoring_system epss
scoring_elements 0.63476
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21302
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043631
reference_id 2043631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043631
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21302
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8mnm-4cgf-2bbt
29
url VCID-8t59-zf4q-afgb
vulnerability_id VCID-8t59-zf4q-afgb
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21436
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-02T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57532
published_at 2026-04-21T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57571
published_at 2026-04-11T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-12T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57529
published_at 2026-04-13T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-16T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57523
published_at 2026-04-04T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-07T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57552
published_at 2026-04-18T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21436
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082646
reference_id 2082646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082646
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:20Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21436
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8t59-zf4q-afgb
30
url VCID-8tpm-5kqs-efhd
vulnerability_id VCID-8tpm-5kqs-efhd
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21531
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60318
published_at 2026-04-21T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63299
published_at 2026-04-07T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.6335
published_at 2026-04-08T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63368
published_at 2026-04-09T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63385
published_at 2026-04-11T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-12T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63332
published_at 2026-04-13T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-16T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63373
published_at 2026-04-18T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21531
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115293
reference_id 2115293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115293
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
reference_id 3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21531
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8tpm-5kqs-efhd
31
url VCID-9851-8zjc-zfgf
vulnerability_id VCID-9851-8zjc-zfgf
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21435
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45297
published_at 2026-04-02T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45302
published_at 2026-04-21T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45305
published_at 2026-04-12T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45307
published_at 2026-04-13T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45358
published_at 2026-04-16T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45353
published_at 2026-04-18T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45319
published_at 2026-04-04T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45261
published_at 2026-04-07T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45317
published_at 2026-04-08T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45316
published_at 2026-04-09T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.45337
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21435
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082645
reference_id 2082645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082645
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:21Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21435
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9851-8zjc-zfgf
32
url VCID-9fvk-eqmz-zfcz
vulnerability_id VCID-9fvk-eqmz-zfcz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21414
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-02T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57532
published_at 2026-04-21T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57571
published_at 2026-04-11T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-12T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57529
published_at 2026-04-13T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-16T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57523
published_at 2026-04-04T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-07T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57552
published_at 2026-04-18T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21414
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082638
reference_id 2082638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082638
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:39Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21414
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fvk-eqmz-zfcz
33
url VCID-9su2-mawm-8ued
vulnerability_id VCID-9su2-mawm-8ued
summary mysql: Server: Federated unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21270
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-02T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51346
published_at 2026-04-21T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51256
published_at 2026-04-07T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51311
published_at 2026-04-08T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51308
published_at 2026-04-09T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51351
published_at 2026-04-11T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51331
published_at 2026-04-12T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-13T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51359
published_at 2026-04-16T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-18T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21270
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043627
reference_id 2043627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043627
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
9
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
aliases CVE-2022-21270
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9su2-mawm-8ued
34
url VCID-ac7j-w1pc-z3h2
vulnerability_id VCID-ac7j-w1pc-z3h2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35610
reference_id
reference_type
scores
0
value 0.00754
scoring_system epss
scoring_elements 0.73167
published_at 2026-04-01T12:55:00Z
1
value 0.00754
scoring_system epss
scoring_elements 0.73177
published_at 2026-04-02T12:55:00Z
2
value 0.00754
scoring_system epss
scoring_elements 0.73265
published_at 2026-04-21T12:55:00Z
3
value 0.00754
scoring_system epss
scoring_elements 0.73197
published_at 2026-04-04T12:55:00Z
4
value 0.00754
scoring_system epss
scoring_elements 0.73172
published_at 2026-04-07T12:55:00Z
5
value 0.00754
scoring_system epss
scoring_elements 0.73208
published_at 2026-04-08T12:55:00Z
6
value 0.00754
scoring_system epss
scoring_elements 0.73222
published_at 2026-04-09T12:55:00Z
7
value 0.00754
scoring_system epss
scoring_elements 0.73247
published_at 2026-04-11T12:55:00Z
8
value 0.00754
scoring_system epss
scoring_elements 0.73228
published_at 2026-04-12T12:55:00Z
9
value 0.00754
scoring_system epss
scoring_elements 0.73221
published_at 2026-04-13T12:55:00Z
10
value 0.00754
scoring_system epss
scoring_elements 0.73264
published_at 2026-04-16T12:55:00Z
11
value 0.00754
scoring_system epss
scoring_elements 0.73273
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35610
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016106
reference_id 2016106
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016106
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35610
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ac7j-w1pc-z3h2
35
url VCID-ae8p-nu59-mfb2
vulnerability_id VCID-ae8p-nu59-mfb2
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21522
reference_id
reference_type
scores
0
value 0.00247
scoring_system epss
scoring_elements 0.47919
published_at 2026-04-02T12:55:00Z
1
value 0.00247
scoring_system epss
scoring_elements 0.47941
published_at 2026-04-04T12:55:00Z
2
value 0.00247
scoring_system epss
scoring_elements 0.47889
published_at 2026-04-07T12:55:00Z
3
value 0.00247
scoring_system epss
scoring_elements 0.47942
published_at 2026-04-08T12:55:00Z
4
value 0.00247
scoring_system epss
scoring_elements 0.47937
published_at 2026-04-09T12:55:00Z
5
value 0.00247
scoring_system epss
scoring_elements 0.47961
published_at 2026-04-11T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.47938
published_at 2026-04-12T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.47948
published_at 2026-04-13T12:55:00Z
8
value 0.00247
scoring_system epss
scoring_elements 0.48002
published_at 2026-04-16T12:55:00Z
9
value 0.00247
scoring_system epss
scoring_elements 0.47997
published_at 2026-04-18T12:55:00Z
10
value 0.00651
scoring_system epss
scoring_elements 0.709
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21522
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115286
reference_id 2115286
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115286
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
reference_id 3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21522
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ae8p-nu59-mfb2
36
url VCID-afgm-qfjk-77h2
vulnerability_id VCID-afgm-qfjk-77h2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35643
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35643
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016132
reference_id 2016132
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016132
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:06Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35643
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-afgm-qfjk-77h2
37
url VCID-bbzn-prse-7fhm
vulnerability_id VCID-bbzn-prse-7fhm
summary mysql: Server: PS unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35637
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44157
published_at 2026-04-01T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44222
published_at 2026-04-02T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44196
published_at 2026-04-21T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44218
published_at 2026-04-12T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44219
published_at 2026-04-13T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44278
published_at 2026-04-16T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44268
published_at 2026-04-18T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44245
published_at 2026-04-04T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44179
published_at 2026-04-07T12:55:00Z
9
value 0.00216
scoring_system epss
scoring_elements 0.4423
published_at 2026-04-08T12:55:00Z
10
value 0.00216
scoring_system epss
scoring_elements 0.44234
published_at 2026-04-09T12:55:00Z
11
value 0.00216
scoring_system epss
scoring_elements 0.44251
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35637
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016126
reference_id 2016126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016126
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:12Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35637
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bbzn-prse-7fhm
38
url VCID-bcv2-xfb3-4ker
vulnerability_id VCID-bcv2-xfb3-4ker
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35642
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35642
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016131
reference_id 2016131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016131
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:07Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35642
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bcv2-xfb3-4ker
39
url VCID-bf13-qnc8-gkeh
vulnerability_id VCID-bf13-qnc8-gkeh
summary mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21374
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21374
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043646
reference_id 2043646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043646
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:05Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21374
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bf13-qnc8-gkeh
40
url VCID-bk52-etdq-8bgt
vulnerability_id VCID-bk52-etdq-8bgt
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21537
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60318
published_at 2026-04-21T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63299
published_at 2026-04-07T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.6335
published_at 2026-04-08T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63368
published_at 2026-04-09T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63385
published_at 2026-04-11T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-12T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63332
published_at 2026-04-13T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-16T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63373
published_at 2026-04-18T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21537
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115295
reference_id 2115295
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115295
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
reference_id 3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21537
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bk52-etdq-8bgt
41
url VCID-byru-kqru-gfe6
vulnerability_id VCID-byru-kqru-gfe6
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35591
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.59899
published_at 2026-04-01T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.59977
published_at 2026-04-02T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.60056
published_at 2026-04-21T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.60002
published_at 2026-04-04T12:55:00Z
4
value 0.00389
scoring_system epss
scoring_elements 0.59973
published_at 2026-04-07T12:55:00Z
5
value 0.00389
scoring_system epss
scoring_elements 0.60023
published_at 2026-04-08T12:55:00Z
6
value 0.00389
scoring_system epss
scoring_elements 0.60036
published_at 2026-04-09T12:55:00Z
7
value 0.00389
scoring_system epss
scoring_elements 0.60057
published_at 2026-04-11T12:55:00Z
8
value 0.00389
scoring_system epss
scoring_elements 0.60042
published_at 2026-04-12T12:55:00Z
9
value 0.00389
scoring_system epss
scoring_elements 0.60025
published_at 2026-04-13T12:55:00Z
10
value 0.00389
scoring_system epss
scoring_elements 0.60064
published_at 2026-04-16T12:55:00Z
11
value 0.00389
scoring_system epss
scoring_elements 0.60071
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35591
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016097
reference_id 2016097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016097
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35591
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byru-kqru-gfe6
42
url VCID-cehv-gwcs-eudz
vulnerability_id VCID-cehv-gwcs-eudz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21527
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60318
published_at 2026-04-21T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63368
published_at 2026-04-09T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63385
published_at 2026-04-11T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-12T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63332
published_at 2026-04-13T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-16T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63373
published_at 2026-04-18T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-04T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63299
published_at 2026-04-07T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.6335
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21527
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115289
reference_id 2115289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115289
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21527
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cehv-gwcs-eudz
43
url VCID-cesc-kr1b-cugn
vulnerability_id VCID-cesc-kr1b-cugn
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21452
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-02T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57532
published_at 2026-04-21T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57571
published_at 2026-04-11T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-12T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57529
published_at 2026-04-13T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-16T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57523
published_at 2026-04-04T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-07T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57552
published_at 2026-04-18T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21452
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082652
reference_id 2082652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082652
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:08Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21452
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cesc-kr1b-cugn
44
url VCID-ctj6-46ju-ybaa
vulnerability_id VCID-ctj6-46ju-ybaa
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21553
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55871
published_at 2026-04-21T12:55:00Z
1
value 0.0037
scoring_system epss
scoring_elements 0.58842
published_at 2026-04-02T12:55:00Z
2
value 0.0037
scoring_system epss
scoring_elements 0.58908
published_at 2026-04-11T12:55:00Z
3
value 0.0037
scoring_system epss
scoring_elements 0.58871
published_at 2026-04-13T12:55:00Z
4
value 0.0037
scoring_system epss
scoring_elements 0.58905
published_at 2026-04-16T12:55:00Z
5
value 0.0037
scoring_system epss
scoring_elements 0.58909
published_at 2026-04-18T12:55:00Z
6
value 0.0037
scoring_system epss
scoring_elements 0.58864
published_at 2026-04-04T12:55:00Z
7
value 0.0037
scoring_system epss
scoring_elements 0.58833
published_at 2026-04-07T12:55:00Z
8
value 0.0037
scoring_system epss
scoring_elements 0.58885
published_at 2026-04-08T12:55:00Z
9
value 0.0037
scoring_system epss
scoring_elements 0.58891
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21553
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115299
reference_id 2115299
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115299
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
fixed_packages
aliases CVE-2022-21553
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctj6-46ju-ybaa
45
url VCID-d3c8-yxse-gqa1
vulnerability_id VCID-d3c8-yxse-gqa1
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21372
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32321
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32175
published_at 2026-04-21T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32222
published_at 2026-04-12T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32191
published_at 2026-04-13T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32225
published_at 2026-04-16T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32203
published_at 2026-04-18T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32359
published_at 2026-04-04T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32183
published_at 2026-04-07T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32231
published_at 2026-04-08T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32259
published_at 2026-04-09T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.3226
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21372
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043645
reference_id 2043645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043645
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:07Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21372
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d3c8-yxse-gqa1
46
url VCID-dbat-jj2y-sqbw
vulnerability_id VCID-dbat-jj2y-sqbw
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21425
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.598
published_at 2026-04-02T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.59875
published_at 2026-04-21T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59864
published_at 2026-04-12T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59845
published_at 2026-04-13T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.59883
published_at 2026-04-16T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.5989
published_at 2026-04-18T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59824
published_at 2026-04-04T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59795
published_at 2026-04-07T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59846
published_at 2026-04-08T12:55:00Z
9
value 0.00387
scoring_system epss
scoring_elements 0.59859
published_at 2026-04-09T12:55:00Z
10
value 0.00387
scoring_system epss
scoring_elements 0.5988
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21425
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082643
reference_id 2082643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082643
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:33Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21425
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dbat-jj2y-sqbw
47
url VCID-e33p-spt4-33bn
vulnerability_id VCID-e33p-spt4-33bn
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21438
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-02T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57532
published_at 2026-04-21T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57571
published_at 2026-04-11T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-12T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57529
published_at 2026-04-13T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-16T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57523
published_at 2026-04-04T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-07T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57552
published_at 2026-04-18T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21438
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082648
reference_id 2082648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082648
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:17Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21438
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e33p-spt4-33bn
48
url VCID-e8ge-ejs7-7ben
vulnerability_id VCID-e8ge-ejs7-7ben
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21297
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-02T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39603
published_at 2026-04-21T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39682
published_at 2026-04-12T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39666
published_at 2026-04-13T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39716
published_at 2026-04-16T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-18T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39722
published_at 2026-04-04T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.3964
published_at 2026-04-07T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39694
published_at 2026-04-08T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39709
published_at 2026-04-09T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39718
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21297
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043629
reference_id 2043629
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043629
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:46Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21297
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ge-ejs7-7ben
49
url VCID-esze-5kfz-sfea
vulnerability_id VCID-esze-5kfz-sfea
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21478
reference_id
reference_type
scores
0
value 0.00331
scoring_system epss
scoring_elements 0.56034
published_at 2026-04-02T12:55:00Z
1
value 0.00331
scoring_system epss
scoring_elements 0.56067
published_at 2026-04-21T12:55:00Z
2
value 0.00331
scoring_system epss
scoring_elements 0.56076
published_at 2026-04-12T12:55:00Z
3
value 0.00331
scoring_system epss
scoring_elements 0.56059
published_at 2026-04-13T12:55:00Z
4
value 0.00331
scoring_system epss
scoring_elements 0.56093
published_at 2026-04-16T12:55:00Z
5
value 0.00331
scoring_system epss
scoring_elements 0.56096
published_at 2026-04-18T12:55:00Z
6
value 0.00331
scoring_system epss
scoring_elements 0.56054
published_at 2026-04-04T12:55:00Z
7
value 0.00331
scoring_system epss
scoring_elements 0.56033
published_at 2026-04-07T12:55:00Z
8
value 0.00331
scoring_system epss
scoring_elements 0.56084
published_at 2026-04-08T12:55:00Z
9
value 0.00331
scoring_system epss
scoring_elements 0.56087
published_at 2026-04-09T12:55:00Z
10
value 0.00331
scoring_system epss
scoring_elements 0.56099
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21478
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082658
reference_id 2082658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082658
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:46Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21478
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esze-5kfz-sfea
50
url VCID-ezwh-q7de-abey
vulnerability_id VCID-ezwh-q7de-abey
summary mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21427
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22213
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22046
published_at 2026-04-21T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22124
published_at 2026-04-08T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22179
published_at 2026-04-09T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22199
published_at 2026-04-11T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22159
published_at 2026-04-12T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22099
published_at 2026-04-16T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22093
published_at 2026-04-18T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22261
published_at 2026-04-04T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22044
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082644
reference_id 2082644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082644
4
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:32Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
6
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
7
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
8
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
9
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
10
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
11
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
12
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
fixed_packages
aliases CVE-2022-21427
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwh-q7de-abey
51
url VCID-f6px-shha-wqcn
vulnerability_id VCID-f6px-shha-wqcn
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21462
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44345
published_at 2026-04-13T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44321
published_at 2026-04-21T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44378
published_at 2026-04-11T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44346
published_at 2026-04-12T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44401
published_at 2026-04-16T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44391
published_at 2026-04-18T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44367
published_at 2026-04-04T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44304
published_at 2026-04-07T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44355
published_at 2026-04-08T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21462
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082657
reference_id 2082657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082657
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:57Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21462
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6px-shha-wqcn
52
url VCID-fjxp-kyqj-7fgp
vulnerability_id VCID-fjxp-kyqj-7fgp
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21423
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54214
published_at 2026-04-02T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54302
published_at 2026-04-21T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54317
published_at 2026-04-16T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54299
published_at 2026-04-12T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54278
published_at 2026-04-13T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54322
published_at 2026-04-18T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.54245
published_at 2026-04-04T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.5422
published_at 2026-04-07T12:55:00Z
8
value 0.00311
scoring_system epss
scoring_elements 0.54272
published_at 2026-04-08T12:55:00Z
9
value 0.00311
scoring_system epss
scoring_elements 0.54268
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21423
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082642
reference_id 2082642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082642
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:34Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21423
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fjxp-kyqj-7fgp
53
url VCID-g6f6-1du9-ufhz
vulnerability_id VCID-g6f6-1du9-ufhz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21254
reference_id
reference_type
scores
0
value 0.01135
scoring_system epss
scoring_elements 0.78322
published_at 2026-04-02T12:55:00Z
1
value 0.01135
scoring_system epss
scoring_elements 0.78397
published_at 2026-04-18T12:55:00Z
2
value 0.01135
scoring_system epss
scoring_elements 0.78353
published_at 2026-04-04T12:55:00Z
3
value 0.01135
scoring_system epss
scoring_elements 0.78336
published_at 2026-04-07T12:55:00Z
4
value 0.01135
scoring_system epss
scoring_elements 0.78362
published_at 2026-04-08T12:55:00Z
5
value 0.01135
scoring_system epss
scoring_elements 0.78368
published_at 2026-04-09T12:55:00Z
6
value 0.01135
scoring_system epss
scoring_elements 0.78394
published_at 2026-04-21T12:55:00Z
7
value 0.01135
scoring_system epss
scoring_elements 0.78376
published_at 2026-04-12T12:55:00Z
8
value 0.01135
scoring_system epss
scoring_elements 0.78369
published_at 2026-04-13T12:55:00Z
9
value 0.01135
scoring_system epss
scoring_elements 0.78399
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21254
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043623
reference_id 2043623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043623
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21254
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g6f6-1du9-ufhz
54
url VCID-gk57-6tsn-4yhs
vulnerability_id VCID-gk57-6tsn-4yhs
summary mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35632
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.3087
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30999
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30846
published_at 2026-04-21T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30914
published_at 2026-04-12T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30869
published_at 2026-04-13T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.309
published_at 2026-04-16T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.3088
published_at 2026-04-18T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.31047
published_at 2026-04-04T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30865
published_at 2026-04-07T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30923
published_at 2026-04-08T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30953
published_at 2026-04-09T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.30956
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35632
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016119
reference_id 2016119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016119
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:17Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35632
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gk57-6tsn-4yhs
55
url VCID-gs25-yymm-e3ak
vulnerability_id VCID-gs25-yymm-e3ak
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21529
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60318
published_at 2026-04-21T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63368
published_at 2026-04-09T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63385
published_at 2026-04-11T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-12T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63332
published_at 2026-04-13T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-16T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63373
published_at 2026-04-18T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-04T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63299
published_at 2026-04-07T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.6335
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21529
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115291
reference_id 2115291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115291
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:22Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21529
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gs25-yymm-e3ak
56
url VCID-gu2a-fwhq-pqhs
vulnerability_id VCID-gu2a-fwhq-pqhs
summary mysql: Server: Components Services unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21368
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39145
published_at 2026-04-02T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39049
published_at 2026-04-21T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39132
published_at 2026-04-12T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39113
published_at 2026-04-13T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39168
published_at 2026-04-16T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39137
published_at 2026-04-18T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39167
published_at 2026-04-04T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39086
published_at 2026-04-07T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39141
published_at 2026-04-08T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39157
published_at 2026-04-09T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39169
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21368
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043643
reference_id 2043643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043643
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:09Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21368
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gu2a-fwhq-pqhs
57
url VCID-gwce-mjav-abcz
vulnerability_id VCID-gwce-mjav-abcz
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21265
reference_id
reference_type
scores
0
value 0.0021
scoring_system epss
scoring_elements 0.43424
published_at 2026-04-02T12:55:00Z
1
value 0.0021
scoring_system epss
scoring_elements 0.43409
published_at 2026-04-21T12:55:00Z
2
value 0.0021
scoring_system epss
scoring_elements 0.43389
published_at 2026-04-07T12:55:00Z
3
value 0.0021
scoring_system epss
scoring_elements 0.4344
published_at 2026-04-08T12:55:00Z
4
value 0.0021
scoring_system epss
scoring_elements 0.43454
published_at 2026-04-09T12:55:00Z
5
value 0.0021
scoring_system epss
scoring_elements 0.43472
published_at 2026-04-11T12:55:00Z
6
value 0.0021
scoring_system epss
scoring_elements 0.43441
published_at 2026-04-12T12:55:00Z
7
value 0.0021
scoring_system epss
scoring_elements 0.43426
published_at 2026-04-13T12:55:00Z
8
value 0.0021
scoring_system epss
scoring_elements 0.43485
published_at 2026-04-16T12:55:00Z
9
value 0.0021
scoring_system epss
scoring_elements 0.43474
published_at 2026-04-18T12:55:00Z
10
value 0.0021
scoring_system epss
scoring_elements 0.43451
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21265
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043626
reference_id 2043626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043626
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21265
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwce-mjav-abcz
58
url VCID-hhep-s9mq-6kbb
vulnerability_id VCID-hhep-s9mq-6kbb
summary mysql: Server: DDL unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35640
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30468
published_at 2026-04-01T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30496
published_at 2026-04-02T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30312
published_at 2026-04-21T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30406
published_at 2026-04-12T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30357
published_at 2026-04-13T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30374
published_at 2026-04-16T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30356
published_at 2026-04-18T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30542
published_at 2026-04-04T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30353
published_at 2026-04-07T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30413
published_at 2026-04-08T12:55:00Z
10
value 0.00117
scoring_system epss
scoring_elements 0.30448
published_at 2026-04-09T12:55:00Z
11
value 0.00117
scoring_system epss
scoring_elements 0.30449
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35640
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016129
reference_id 2016129
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016129
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:09Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35640
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hhep-s9mq-6kbb
59
url VCID-hv87-q417-8qd3
vulnerability_id VCID-hv87-q417-8qd3
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21569
reference_id
reference_type
scores
0
value 0.00415
scoring_system epss
scoring_elements 0.61698
published_at 2026-04-21T12:55:00Z
1
value 0.00481
scoring_system epss
scoring_elements 0.65115
published_at 2026-04-08T12:55:00Z
2
value 0.00481
scoring_system epss
scoring_elements 0.65076
published_at 2026-04-02T12:55:00Z
3
value 0.00481
scoring_system epss
scoring_elements 0.65138
published_at 2026-04-12T12:55:00Z
4
value 0.00481
scoring_system epss
scoring_elements 0.6511
published_at 2026-04-13T12:55:00Z
5
value 0.00481
scoring_system epss
scoring_elements 0.65146
published_at 2026-04-16T12:55:00Z
6
value 0.00481
scoring_system epss
scoring_elements 0.65156
published_at 2026-04-18T12:55:00Z
7
value 0.00481
scoring_system epss
scoring_elements 0.65103
published_at 2026-04-04T12:55:00Z
8
value 0.00481
scoring_system epss
scoring_elements 0.65066
published_at 2026-04-07T12:55:00Z
9
value 0.00481
scoring_system epss
scoring_elements 0.65129
published_at 2026-04-09T12:55:00Z
10
value 0.00481
scoring_system epss
scoring_elements 0.65148
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21569
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115301
reference_id 2115301
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115301
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
fixed_packages
aliases CVE-2022-21569
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hv87-q417-8qd3
60
url VCID-hwf4-mqxw-4ycq
vulnerability_id VCID-hwf4-mqxw-4ycq
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35612
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59261
published_at 2026-04-01T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59335
published_at 2026-04-02T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59393
published_at 2026-04-21T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59391
published_at 2026-04-12T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59373
published_at 2026-04-13T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59405
published_at 2026-04-16T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59412
published_at 2026-04-18T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59358
published_at 2026-04-04T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59324
published_at 2026-04-07T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59375
published_at 2026-04-08T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59388
published_at 2026-04-09T12:55:00Z
11
value 0.00378
scoring_system epss
scoring_elements 0.59407
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35612
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016107
reference_id 2016107
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016107
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:31Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35612
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hwf4-mqxw-4ycq
61
url VCID-jkxq-q4u2-6fb6
vulnerability_id VCID-jkxq-q4u2-6fb6
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35575
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60158
published_at 2026-04-01T12:55:00Z
1
value 0.00393
scoring_system epss
scoring_elements 0.60234
published_at 2026-04-02T12:55:00Z
2
value 0.00393
scoring_system epss
scoring_elements 0.60314
published_at 2026-04-21T12:55:00Z
3
value 0.00393
scoring_system epss
scoring_elements 0.6026
published_at 2026-04-04T12:55:00Z
4
value 0.00393
scoring_system epss
scoring_elements 0.60228
published_at 2026-04-07T12:55:00Z
5
value 0.00393
scoring_system epss
scoring_elements 0.60277
published_at 2026-04-08T12:55:00Z
6
value 0.00393
scoring_system epss
scoring_elements 0.60292
published_at 2026-04-09T12:55:00Z
7
value 0.00393
scoring_system epss
scoring_elements 0.60313
published_at 2026-04-11T12:55:00Z
8
value 0.00393
scoring_system epss
scoring_elements 0.60299
published_at 2026-04-12T12:55:00Z
9
value 0.00393
scoring_system epss
scoring_elements 0.60281
published_at 2026-04-13T12:55:00Z
10
value 0.00393
scoring_system epss
scoring_elements 0.60321
published_at 2026-04-16T12:55:00Z
11
value 0.00393
scoring_system epss
scoring_elements 0.60328
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35575
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016094
reference_id 2016094
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016094
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35575
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jkxq-q4u2-6fb6
62
url VCID-jvss-882h-63bb
vulnerability_id VCID-jvss-882h-63bb
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21526
reference_id
reference_type
scores
0
value 0.00196
scoring_system epss
scoring_elements 0.41558
published_at 2026-04-02T12:55:00Z
1
value 0.00196
scoring_system epss
scoring_elements 0.41513
published_at 2026-04-07T12:55:00Z
2
value 0.00196
scoring_system epss
scoring_elements 0.41563
published_at 2026-04-08T12:55:00Z
3
value 0.00196
scoring_system epss
scoring_elements 0.41572
published_at 2026-04-09T12:55:00Z
4
value 0.00196
scoring_system epss
scoring_elements 0.41593
published_at 2026-04-11T12:55:00Z
5
value 0.00196
scoring_system epss
scoring_elements 0.4156
published_at 2026-04-12T12:55:00Z
6
value 0.00196
scoring_system epss
scoring_elements 0.41546
published_at 2026-04-13T12:55:00Z
7
value 0.00196
scoring_system epss
scoring_elements 0.41591
published_at 2026-04-16T12:55:00Z
8
value 0.00196
scoring_system epss
scoring_elements 0.41566
published_at 2026-04-18T12:55:00Z
9
value 0.00196
scoring_system epss
scoring_elements 0.41587
published_at 2026-04-04T12:55:00Z
10
value 0.00386
scoring_system epss
scoring_elements 0.59805
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21526
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115288
reference_id 2115288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115288
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21526
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvss-882h-63bb
63
url VCID-k1mw-4auu-v7em
vulnerability_id VCID-k1mw-4auu-v7em
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35624
reference_id
reference_type
scores
0
value 0.00301
scoring_system epss
scoring_elements 0.53371
published_at 2026-04-01T12:55:00Z
1
value 0.00301
scoring_system epss
scoring_elements 0.53395
published_at 2026-04-02T12:55:00Z
2
value 0.00301
scoring_system epss
scoring_elements 0.53477
published_at 2026-04-21T12:55:00Z
3
value 0.00301
scoring_system epss
scoring_elements 0.5347
published_at 2026-04-12T12:55:00Z
4
value 0.00301
scoring_system epss
scoring_elements 0.53454
published_at 2026-04-13T12:55:00Z
5
value 0.00301
scoring_system epss
scoring_elements 0.53491
published_at 2026-04-16T12:55:00Z
6
value 0.00301
scoring_system epss
scoring_elements 0.53496
published_at 2026-04-18T12:55:00Z
7
value 0.00301
scoring_system epss
scoring_elements 0.53421
published_at 2026-04-04T12:55:00Z
8
value 0.00301
scoring_system epss
scoring_elements 0.5339
published_at 2026-04-07T12:55:00Z
9
value 0.00301
scoring_system epss
scoring_elements 0.53442
published_at 2026-04-08T12:55:00Z
10
value 0.00301
scoring_system epss
scoring_elements 0.53438
published_at 2026-04-09T12:55:00Z
11
value 0.00301
scoring_system epss
scoring_elements 0.53487
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35624
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016110
reference_id 2016110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016110
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:25Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
7
reference_url https://usn.ubuntu.com/5123-2/
reference_id USN-5123-2
reference_type
scores
url https://usn.ubuntu.com/5123-2/
fixed_packages
aliases CVE-2021-35624
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k1mw-4auu-v7em
64
url VCID-k26n-5mxy-w7ak
vulnerability_id VCID-k26n-5mxy-w7ak
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21607
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66835
published_at 2026-04-02T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66899
published_at 2026-04-21T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66901
published_at 2026-04-12T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66869
published_at 2026-04-13T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66902
published_at 2026-04-16T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66917
published_at 2026-04-18T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.66861
published_at 2026-04-04T12:55:00Z
7
value 0.00522
scoring_system epss
scoring_elements 0.66833
published_at 2026-04-07T12:55:00Z
8
value 0.00522
scoring_system epss
scoring_elements 0.66882
published_at 2026-04-08T12:55:00Z
9
value 0.00522
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-09T12:55:00Z
10
value 0.00522
scoring_system epss
scoring_elements 0.66915
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21607
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142867
reference_id 2142867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142867
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:08Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21607
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k26n-5mxy-w7ak
65
url VCID-k37x-pg16-bqbb
vulnerability_id VCID-k37x-pg16-bqbb
summary mysql: Server: Logging unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35633
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40135
published_at 2026-04-01T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40286
published_at 2026-04-02T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40192
published_at 2026-04-21T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40272
published_at 2026-04-12T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40252
published_at 2026-04-13T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40299
published_at 2026-04-16T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40268
published_at 2026-04-18T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40311
published_at 2026-04-04T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40233
published_at 2026-04-07T12:55:00Z
9
value 0.00185
scoring_system epss
scoring_elements 0.40285
published_at 2026-04-08T12:55:00Z
10
value 0.00185
scoring_system epss
scoring_elements 0.40297
published_at 2026-04-09T12:55:00Z
11
value 0.00185
scoring_system epss
scoring_elements 0.40309
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35633
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016120
reference_id 2016120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016120
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:16Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35633
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k37x-pg16-bqbb
66
url VCID-kg95-ffr7-fkh8
vulnerability_id VCID-kg95-ffr7-fkh8
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35644
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35644
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016133
reference_id 2016133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016133
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:05Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35644
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kg95-ffr7-fkh8
67
url VCID-krjf-4xbf-s3dd
vulnerability_id VCID-krjf-4xbf-s3dd
summary mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21444
reference_id
reference_type
scores
0
value 0.00365
scoring_system epss
scoring_elements 0.58474
published_at 2026-04-02T12:55:00Z
1
value 0.00365
scoring_system epss
scoring_elements 0.58539
published_at 2026-04-18T12:55:00Z
2
value 0.00365
scoring_system epss
scoring_elements 0.58541
published_at 2026-04-11T12:55:00Z
3
value 0.00365
scoring_system epss
scoring_elements 0.58521
published_at 2026-04-12T12:55:00Z
4
value 0.00365
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-13T12:55:00Z
5
value 0.00365
scoring_system epss
scoring_elements 0.58534
published_at 2026-04-16T12:55:00Z
6
value 0.00365
scoring_system epss
scoring_elements 0.58494
published_at 2026-04-04T12:55:00Z
7
value 0.00365
scoring_system epss
scoring_elements 0.58466
published_at 2026-04-07T12:55:00Z
8
value 0.00365
scoring_system epss
scoring_elements 0.58518
published_at 2026-04-21T12:55:00Z
9
value 0.00365
scoring_system epss
scoring_elements 0.58524
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21444
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082650
reference_id 2082650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082650
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:15Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
8
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
aliases CVE-2022-21444
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krjf-4xbf-s3dd
68
url VCID-m997-zjm1-uffn
vulnerability_id VCID-m997-zjm1-uffn
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21872
reference_id
reference_type
scores
0
value 0.00436
scoring_system epss
scoring_elements 0.6299
published_at 2026-04-04T12:55:00Z
1
value 0.00436
scoring_system epss
scoring_elements 0.62962
published_at 2026-04-02T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65105
published_at 2026-04-21T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65112
published_at 2026-04-16T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.65121
published_at 2026-04-18T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65033
published_at 2026-04-07T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65082
published_at 2026-04-08T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65096
published_at 2026-04-09T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65114
published_at 2026-04-11T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65104
published_at 2026-04-12T12:55:00Z
10
value 0.0048
scoring_system epss
scoring_elements 0.65076
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21872
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162279
reference_id 2162279
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162279
3
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
4
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2023-21872
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m997-zjm1-uffn
69
url VCID-mq1t-yqxh-rkhv
vulnerability_id VCID-mq1t-yqxh-rkhv
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21530
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60318
published_at 2026-04-21T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-02T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63299
published_at 2026-04-07T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.6335
published_at 2026-04-08T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63368
published_at 2026-04-09T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63385
published_at 2026-04-11T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63369
published_at 2026-04-12T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63332
published_at 2026-04-13T12:55:00Z
8
value 0.00443
scoring_system epss
scoring_elements 0.63366
published_at 2026-04-16T12:55:00Z
9
value 0.00443
scoring_system epss
scoring_elements 0.63373
published_at 2026-04-18T12:55:00Z
10
value 0.00443
scoring_system epss
scoring_elements 0.63333
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21530
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115292
reference_id 2115292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115292
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
reference_id 3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21530
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mq1t-yqxh-rkhv
70
url VCID-nh7n-qv9q-8bda
vulnerability_id VCID-nh7n-qv9q-8bda
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21440
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51025
published_at 2026-04-02T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51087
published_at 2026-04-21T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51104
published_at 2026-04-16T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.51083
published_at 2026-04-12T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51066
published_at 2026-04-13T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.5111
published_at 2026-04-18T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.5105
published_at 2026-04-04T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.51007
published_at 2026-04-07T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51064
published_at 2026-04-08T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.5106
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21440
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082649
reference_id 2082649
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082649
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:16Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21440
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nh7n-qv9q-8bda
71
url VCID-nn19-u26n-6qdd
vulnerability_id VCID-nn19-u26n-6qdd
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21379
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-02T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50127
published_at 2026-04-21T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.5014
published_at 2026-04-11T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.50114
published_at 2026-04-12T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50111
published_at 2026-04-13T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50155
published_at 2026-04-18T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50125
published_at 2026-04-04T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50075
published_at 2026-04-07T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50129
published_at 2026-04-08T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21379
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043648
reference_id 2043648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043648
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:00Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21379
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nn19-u26n-6qdd
72
url VCID-npk1-jstp-bkc7
vulnerability_id VCID-npk1-jstp-bkc7
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21352
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52552
published_at 2026-04-02T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52641
published_at 2026-04-21T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52625
published_at 2026-04-12T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52611
published_at 2026-04-13T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52649
published_at 2026-04-16T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52656
published_at 2026-04-18T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52579
published_at 2026-04-04T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52546
published_at 2026-04-07T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52597
published_at 2026-04-08T12:55:00Z
9
value 0.00293
scoring_system epss
scoring_elements 0.52591
published_at 2026-04-09T12:55:00Z
10
value 0.00293
scoring_system epss
scoring_elements 0.52642
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21352
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043639
reference_id 2043639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043639
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:19Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21352
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npk1-jstp-bkc7
73
url VCID-nprc-6br4-gfdj
vulnerability_id VCID-nprc-6br4-gfdj
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2481
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.7138
published_at 2026-04-07T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71388
published_at 2026-04-02T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71453
published_at 2026-04-21T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71406
published_at 2026-04-04T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71421
published_at 2026-04-08T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71433
published_at 2026-04-09T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71456
published_at 2026-04-11T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.7144
published_at 2026-04-12T12:55:00Z
8
value 0.00674
scoring_system epss
scoring_elements 0.71422
published_at 2026-04-13T12:55:00Z
9
value 0.00674
scoring_system epss
scoring_elements 0.71468
published_at 2026-04-16T12:55:00Z
10
value 0.00674
scoring_system epss
scoring_elements 0.71473
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2481
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016091
reference_id 2016091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016091
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-2481
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nprc-6br4-gfdj
74
url VCID-p2hz-hqhw-zqhk
vulnerability_id VCID-p2hz-hqhw-zqhk
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21638
reference_id
reference_type
scores
0
value 0.00475
scoring_system epss
scoring_elements 0.64747
published_at 2026-04-02T12:55:00Z
1
value 0.00475
scoring_system epss
scoring_elements 0.64815
published_at 2026-04-21T12:55:00Z
2
value 0.00475
scoring_system epss
scoring_elements 0.64808
published_at 2026-04-12T12:55:00Z
3
value 0.00475
scoring_system epss
scoring_elements 0.64779
published_at 2026-04-13T12:55:00Z
4
value 0.00475
scoring_system epss
scoring_elements 0.64817
published_at 2026-04-16T12:55:00Z
5
value 0.00475
scoring_system epss
scoring_elements 0.64828
published_at 2026-04-18T12:55:00Z
6
value 0.00475
scoring_system epss
scoring_elements 0.64775
published_at 2026-04-04T12:55:00Z
7
value 0.00475
scoring_system epss
scoring_elements 0.64738
published_at 2026-04-07T12:55:00Z
8
value 0.00475
scoring_system epss
scoring_elements 0.64787
published_at 2026-04-08T12:55:00Z
9
value 0.00475
scoring_system epss
scoring_elements 0.64802
published_at 2026-04-09T12:55:00Z
10
value 0.00475
scoring_system epss
scoring_elements 0.64819
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21638
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142876
reference_id 2142876
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142876
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:44Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21638
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2hz-hqhw-zqhk
75
url VCID-p341-9tza-nkcs
vulnerability_id VCID-p341-9tza-nkcs
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21339
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59716
published_at 2026-04-02T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59789
published_at 2026-04-21T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59741
published_at 2026-04-04T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59711
published_at 2026-04-07T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59762
published_at 2026-04-13T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59776
published_at 2026-04-09T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.59796
published_at 2026-04-11T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.5978
published_at 2026-04-12T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59799
published_at 2026-04-16T12:55:00Z
9
value 0.00385
scoring_system epss
scoring_elements 0.59806
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21339
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043634
reference_id 2043634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043634
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21339
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p341-9tza-nkcs
76
url VCID-pq5z-fp69-sufy
vulnerability_id VCID-pq5z-fp69-sufy
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35608
reference_id
reference_type
scores
0
value 0.00359
scoring_system epss
scoring_elements 0.57978
published_at 2026-04-01T12:55:00Z
1
value 0.00359
scoring_system epss
scoring_elements 0.58062
published_at 2026-04-02T12:55:00Z
2
value 0.00359
scoring_system epss
scoring_elements 0.58097
published_at 2026-04-21T12:55:00Z
3
value 0.00359
scoring_system epss
scoring_elements 0.58084
published_at 2026-04-04T12:55:00Z
4
value 0.00359
scoring_system epss
scoring_elements 0.58059
published_at 2026-04-07T12:55:00Z
5
value 0.00359
scoring_system epss
scoring_elements 0.58113
published_at 2026-04-08T12:55:00Z
6
value 0.00359
scoring_system epss
scoring_elements 0.58117
published_at 2026-04-09T12:55:00Z
7
value 0.00359
scoring_system epss
scoring_elements 0.58133
published_at 2026-04-11T12:55:00Z
8
value 0.00359
scoring_system epss
scoring_elements 0.5811
published_at 2026-04-12T12:55:00Z
9
value 0.00359
scoring_system epss
scoring_elements 0.5809
published_at 2026-04-13T12:55:00Z
10
value 0.00359
scoring_system epss
scoring_elements 0.58121
published_at 2026-04-16T12:55:00Z
11
value 0.00359
scoring_system epss
scoring_elements 0.58122
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35608
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016105
reference_id 2016105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016105
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35608
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pq5z-fp69-sufy
77
url VCID-pw3f-uc38-5qcb
vulnerability_id VCID-pw3f-uc38-5qcb
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35622
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.4588
published_at 2026-04-01T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45927
published_at 2026-04-02T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45998
published_at 2026-04-18T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45972
published_at 2026-04-11T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45944
published_at 2026-04-21T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.45951
published_at 2026-04-13T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.46003
published_at 2026-04-16T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45948
published_at 2026-04-04T12:55:00Z
8
value 0.00231
scoring_system epss
scoring_elements 0.45896
published_at 2026-04-07T12:55:00Z
9
value 0.00231
scoring_system epss
scoring_elements 0.45952
published_at 2026-04-08T12:55:00Z
10
value 0.00231
scoring_system epss
scoring_elements 0.45949
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35622
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016108
reference_id 2016108
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016108
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:27Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35622
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pw3f-uc38-5qcb
78
url VCID-q2q2-ubam-fbh9
vulnerability_id VCID-q2q2-ubam-fbh9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35577
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-01T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.54016
published_at 2026-04-02T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54106
published_at 2026-04-21T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.54042
published_at 2026-04-04T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54019
published_at 2026-04-07T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.5407
published_at 2026-04-09T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54117
published_at 2026-04-11T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54099
published_at 2026-04-12T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54082
published_at 2026-04-13T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.54121
published_at 2026-04-16T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.54125
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35577
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016095
reference_id 2016095
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016095
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35577
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q2q2-ubam-fbh9
79
url VCID-q4rs-91hh-yfe7
vulnerability_id VCID-q4rs-91hh-yfe7
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21256
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58191
published_at 2026-04-02T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58227
published_at 2026-04-21T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58183
published_at 2026-04-07T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58238
published_at 2026-04-08T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58243
published_at 2026-04-09T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.5826
published_at 2026-04-11T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58237
published_at 2026-04-12T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58218
published_at 2026-04-13T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-16T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58252
published_at 2026-04-18T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58211
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21256
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043624
reference_id 2043624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043624
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21256
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4rs-91hh-yfe7
80
url VCID-qbyx-gq4t-rkhd
vulnerability_id VCID-qbyx-gq4t-rkhd
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2478
reference_id
reference_type
scores
0
value 0.0042
scoring_system epss
scoring_elements 0.61805
published_at 2026-04-01T12:55:00Z
1
value 0.0042
scoring_system epss
scoring_elements 0.61879
published_at 2026-04-02T12:55:00Z
2
value 0.0042
scoring_system epss
scoring_elements 0.61965
published_at 2026-04-21T12:55:00Z
3
value 0.0042
scoring_system epss
scoring_elements 0.6191
published_at 2026-04-04T12:55:00Z
4
value 0.0042
scoring_system epss
scoring_elements 0.61881
published_at 2026-04-07T12:55:00Z
5
value 0.0042
scoring_system epss
scoring_elements 0.6193
published_at 2026-04-08T12:55:00Z
6
value 0.0042
scoring_system epss
scoring_elements 0.61947
published_at 2026-04-09T12:55:00Z
7
value 0.0042
scoring_system epss
scoring_elements 0.61969
published_at 2026-04-11T12:55:00Z
8
value 0.0042
scoring_system epss
scoring_elements 0.61957
published_at 2026-04-12T12:55:00Z
9
value 0.0042
scoring_system epss
scoring_elements 0.61937
published_at 2026-04-13T12:55:00Z
10
value 0.0042
scoring_system epss
scoring_elements 0.61979
published_at 2026-04-16T12:55:00Z
11
value 0.0042
scoring_system epss
scoring_elements 0.61983
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2478
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016089
reference_id 2016089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016089
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-2478
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbyx-gq4t-rkhd
81
url VCID-qhmn-p8zd-9qeh
vulnerability_id VCID-qhmn-p8zd-9qeh
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21245
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.39078
published_at 2026-04-02T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38979
published_at 2026-04-21T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.39015
published_at 2026-04-07T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.39068
published_at 2026-04-08T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.39083
published_at 2026-04-09T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.39096
published_at 2026-04-11T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.39059
published_at 2026-04-12T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.39038
published_at 2026-04-13T12:55:00Z
8
value 0.00175
scoring_system epss
scoring_elements 0.39093
published_at 2026-04-16T12:55:00Z
9
value 0.00175
scoring_system epss
scoring_elements 0.39063
published_at 2026-04-18T12:55:00Z
10
value 0.00175
scoring_system epss
scoring_elements 0.39097
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21245
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043620
reference_id 2043620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043620
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
9
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
aliases CVE-2022-21245
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhmn-p8zd-9qeh
82
url VCID-qp52-bkgp-bbfu
vulnerability_id VCID-qp52-bkgp-bbfu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21479
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.53467
published_at 2026-04-02T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53546
published_at 2026-04-21T12:55:00Z
2
value 0.00302
scoring_system epss
scoring_elements 0.53542
published_at 2026-04-12T12:55:00Z
3
value 0.00302
scoring_system epss
scoring_elements 0.53525
published_at 2026-04-13T12:55:00Z
4
value 0.00302
scoring_system epss
scoring_elements 0.5356
published_at 2026-04-16T12:55:00Z
5
value 0.00302
scoring_system epss
scoring_elements 0.53566
published_at 2026-04-18T12:55:00Z
6
value 0.00302
scoring_system epss
scoring_elements 0.53493
published_at 2026-04-04T12:55:00Z
7
value 0.00302
scoring_system epss
scoring_elements 0.53462
published_at 2026-04-07T12:55:00Z
8
value 0.00302
scoring_system epss
scoring_elements 0.53514
published_at 2026-04-08T12:55:00Z
9
value 0.00302
scoring_system epss
scoring_elements 0.5351
published_at 2026-04-09T12:55:00Z
10
value 0.00302
scoring_system epss
scoring_elements 0.53559
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21479
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082659
reference_id 2082659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082659
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:45Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21479
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp52-bkgp-bbfu
83
url VCID-qqbf-2xy3-k3bs
vulnerability_id VCID-qqbf-2xy3-k3bs
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21418
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36488
published_at 2026-04-02T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36349
published_at 2026-04-21T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36402
published_at 2026-04-12T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.3638
published_at 2026-04-13T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36421
published_at 2026-04-16T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36404
published_at 2026-04-18T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36522
published_at 2026-04-04T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.3636
published_at 2026-04-07T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.3641
published_at 2026-04-08T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.3643
published_at 2026-04-09T12:55:00Z
10
value 0.00156
scoring_system epss
scoring_elements 0.36437
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21418
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082641
reference_id 2082641
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082641
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:36Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21418
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qqbf-2xy3-k3bs
84
url VCID-qra2-ejj6-sqgv
vulnerability_id VCID-qra2-ejj6-sqgv
summary mysql: Server: Federated unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21547
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55871
published_at 2026-04-21T12:55:00Z
1
value 0.0037
scoring_system epss
scoring_elements 0.58842
published_at 2026-04-02T12:55:00Z
2
value 0.0037
scoring_system epss
scoring_elements 0.58908
published_at 2026-04-11T12:55:00Z
3
value 0.0037
scoring_system epss
scoring_elements 0.58871
published_at 2026-04-13T12:55:00Z
4
value 0.0037
scoring_system epss
scoring_elements 0.58905
published_at 2026-04-16T12:55:00Z
5
value 0.0037
scoring_system epss
scoring_elements 0.58909
published_at 2026-04-18T12:55:00Z
6
value 0.0037
scoring_system epss
scoring_elements 0.58864
published_at 2026-04-04T12:55:00Z
7
value 0.0037
scoring_system epss
scoring_elements 0.58833
published_at 2026-04-07T12:55:00Z
8
value 0.0037
scoring_system epss
scoring_elements 0.58885
published_at 2026-04-08T12:55:00Z
9
value 0.0037
scoring_system epss
scoring_elements 0.58891
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21547
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115298
reference_id 2115298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115298
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
fixed_packages
aliases CVE-2022-21547
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qra2-ejj6-sqgv
85
url VCID-qtjn-m9ak-6ye1
vulnerability_id VCID-qtjn-m9ak-6ye1
summary mysql: Server: Replication unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35546
reference_id
reference_type
scores
0
value 0.00534
scoring_system epss
scoring_elements 0.67326
published_at 2026-04-01T12:55:00Z
1
value 0.00534
scoring_system epss
scoring_elements 0.67362
published_at 2026-04-02T12:55:00Z
2
value 0.00534
scoring_system epss
scoring_elements 0.67429
published_at 2026-04-21T12:55:00Z
3
value 0.00534
scoring_system epss
scoring_elements 0.67385
published_at 2026-04-04T12:55:00Z
4
value 0.00534
scoring_system epss
scoring_elements 0.67363
published_at 2026-04-07T12:55:00Z
5
value 0.00534
scoring_system epss
scoring_elements 0.67415
published_at 2026-04-08T12:55:00Z
6
value 0.00534
scoring_system epss
scoring_elements 0.67428
published_at 2026-04-09T12:55:00Z
7
value 0.00534
scoring_system epss
scoring_elements 0.67449
published_at 2026-04-11T12:55:00Z
8
value 0.00534
scoring_system epss
scoring_elements 0.67437
published_at 2026-04-12T12:55:00Z
9
value 0.00534
scoring_system epss
scoring_elements 0.67403
published_at 2026-04-13T12:55:00Z
10
value 0.00534
scoring_system epss
scoring_elements 0.67439
published_at 2026-04-16T12:55:00Z
11
value 0.00534
scoring_system epss
scoring_elements 0.67451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35546
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016093
reference_id 2016093
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016093
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35546
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtjn-m9ak-6ye1
86
url VCID-r33z-et19-mfa8
vulnerability_id VCID-r33z-et19-mfa8
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21950.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21950
reference_id
reference_type
scores
0
value 0.00173
scoring_system epss
scoring_elements 0.38758
published_at 2026-04-08T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.38662
published_at 2026-04-21T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38745
published_at 2026-04-12T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38717
published_at 2026-04-13T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38763
published_at 2026-04-16T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38742
published_at 2026-04-18T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.3878
published_at 2026-04-04T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38708
published_at 2026-04-07T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.38769
published_at 2026-04-09T12:55:00Z
9
value 0.00173
scoring_system epss
scoring_elements 0.38781
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21950
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
reference_id 1041819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224209
reference_id 2224209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224209
4
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:36Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2023-21950
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r33z-et19-mfa8
87
url VCID-r4jk-v7qa-nkf9
vulnerability_id VCID-r4jk-v7qa-nkf9
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35639
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34671
published_at 2026-04-01T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34887
published_at 2026-04-02T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34784
published_at 2026-04-21T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34831
published_at 2026-04-12T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34807
published_at 2026-04-13T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34845
published_at 2026-04-16T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34828
published_at 2026-04-18T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34914
published_at 2026-04-04T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34791
published_at 2026-04-07T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34835
published_at 2026-04-08T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34864
published_at 2026-04-09T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35639
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016128
reference_id 2016128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016128
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:10Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35639
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4jk-v7qa-nkf9
88
url VCID-rhr1-hje4-2qe6
vulnerability_id VCID-rhr1-hje4-2qe6
summary mysql: Server: Options unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35602
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.45062
published_at 2026-04-01T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.45143
published_at 2026-04-02T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45146
published_at 2026-04-21T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45165
published_at 2026-04-04T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45107
published_at 2026-04-07T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.4516
published_at 2026-04-09T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45181
published_at 2026-04-11T12:55:00Z
7
value 0.00224
scoring_system epss
scoring_elements 0.45149
published_at 2026-04-12T12:55:00Z
8
value 0.00224
scoring_system epss
scoring_elements 0.45151
published_at 2026-04-13T12:55:00Z
9
value 0.00224
scoring_system epss
scoring_elements 0.45201
published_at 2026-04-16T12:55:00Z
10
value 0.00224
scoring_system epss
scoring_elements 0.45194
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35602
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016100
reference_id 2016100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016100
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35602
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhr1-hje4-2qe6
89
url VCID-rjhp-4nxn-zya4
vulnerability_id VCID-rjhp-4nxn-zya4
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21342
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21342
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043635
reference_id 2043635
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043635
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:24Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21342
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rjhp-4nxn-zya4
90
url VCID-rqm1-abez-ska4
vulnerability_id VCID-rqm1-abez-ska4
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21412
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21412
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082636
reference_id 2082636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082636
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:41Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21412
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rqm1-abez-ska4
91
url VCID-ruz5-9rez-77gq
vulnerability_id VCID-ruz5-9rez-77gq
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21370
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-02T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39603
published_at 2026-04-21T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39682
published_at 2026-04-12T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39666
published_at 2026-04-13T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39716
published_at 2026-04-16T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-18T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39722
published_at 2026-04-04T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.3964
published_at 2026-04-07T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39694
published_at 2026-04-08T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39709
published_at 2026-04-09T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39718
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21370
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043644
reference_id 2043644
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043644
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:08Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21370
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ruz5-9rez-77gq
92
url VCID-s1cy-v2fk-kua7
vulnerability_id VCID-s1cy-v2fk-kua7
summary mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21454
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.6057
published_at 2026-04-02T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.60655
published_at 2026-04-21T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60642
published_at 2026-04-12T12:55:00Z
3
value 0.00398
scoring_system epss
scoring_elements 0.60621
published_at 2026-04-13T12:55:00Z
4
value 0.00398
scoring_system epss
scoring_elements 0.60663
published_at 2026-04-16T12:55:00Z
5
value 0.00398
scoring_system epss
scoring_elements 0.60669
published_at 2026-04-18T12:55:00Z
6
value 0.00398
scoring_system epss
scoring_elements 0.60599
published_at 2026-04-04T12:55:00Z
7
value 0.00398
scoring_system epss
scoring_elements 0.60568
published_at 2026-04-07T12:55:00Z
8
value 0.00398
scoring_system epss
scoring_elements 0.60617
published_at 2026-04-08T12:55:00Z
9
value 0.00398
scoring_system epss
scoring_elements 0.60632
published_at 2026-04-09T12:55:00Z
10
value 0.00398
scoring_system epss
scoring_elements 0.60657
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21454
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082653
reference_id 2082653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082653
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:06Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
8
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
aliases CVE-2022-21454
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1cy-v2fk-kua7
93
url VCID-sc1z-ry96-duc7
vulnerability_id VCID-sc1z-ry96-duc7
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21635
reference_id
reference_type
scores
0
value 0.00693
scoring_system epss
scoring_elements 0.7182
published_at 2026-04-02T12:55:00Z
1
value 0.00693
scoring_system epss
scoring_elements 0.71883
published_at 2026-04-21T12:55:00Z
2
value 0.00693
scoring_system epss
scoring_elements 0.71886
published_at 2026-04-11T12:55:00Z
3
value 0.00693
scoring_system epss
scoring_elements 0.71868
published_at 2026-04-12T12:55:00Z
4
value 0.00693
scoring_system epss
scoring_elements 0.71894
published_at 2026-04-16T12:55:00Z
5
value 0.00693
scoring_system epss
scoring_elements 0.71899
published_at 2026-04-18T12:55:00Z
6
value 0.00693
scoring_system epss
scoring_elements 0.71839
published_at 2026-04-04T12:55:00Z
7
value 0.00693
scoring_system epss
scoring_elements 0.71812
published_at 2026-04-07T12:55:00Z
8
value 0.00693
scoring_system epss
scoring_elements 0.71851
published_at 2026-04-13T12:55:00Z
9
value 0.00693
scoring_system epss
scoring_elements 0.71862
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21635
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142874
reference_id 2142874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142874
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:48Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21635
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sc1z-ry96-duc7
94
url VCID-sg3r-6972-uyfz
vulnerability_id VCID-sg3r-6972-uyfz
summary mysql: Server: Logging unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21460
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.57074
published_at 2026-04-02T12:55:00Z
1
value 0.00345
scoring_system epss
scoring_elements 0.57099
published_at 2026-04-21T12:55:00Z
2
value 0.00345
scoring_system epss
scoring_elements 0.57139
published_at 2026-04-11T12:55:00Z
3
value 0.00345
scoring_system epss
scoring_elements 0.57118
published_at 2026-04-12T12:55:00Z
4
value 0.00345
scoring_system epss
scoring_elements 0.57126
published_at 2026-04-16T12:55:00Z
5
value 0.00345
scoring_system epss
scoring_elements 0.57121
published_at 2026-04-18T12:55:00Z
6
value 0.00345
scoring_system epss
scoring_elements 0.57098
published_at 2026-04-13T12:55:00Z
7
value 0.00345
scoring_system epss
scoring_elements 0.57075
published_at 2026-04-07T12:55:00Z
8
value 0.00345
scoring_system epss
scoring_elements 0.57125
published_at 2026-04-08T12:55:00Z
9
value 0.00345
scoring_system epss
scoring_elements 0.57127
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21460
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082656
reference_id 2082656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082656
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:00Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
8
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
aliases CVE-2022-21460
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sg3r-6972-uyfz
95
url VCID-svv4-xj5y-5uad
vulnerability_id VCID-svv4-xj5y-5uad
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35627
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63092
published_at 2026-04-02T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63177
published_at 2026-04-18T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63173
published_at 2026-04-11T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63158
published_at 2026-04-21T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-13T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6317
published_at 2026-04-16T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63138
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35627
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016113
reference_id 2016113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016113
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:22Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35627
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svv4-xj5y-5uad
96
url VCID-syty-vyfp-yygc
vulnerability_id VCID-syty-vyfp-yygc
summary mysql: Server: Error Handling unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35596
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-01T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.54016
published_at 2026-04-02T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54106
published_at 2026-04-21T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.54042
published_at 2026-04-04T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54019
published_at 2026-04-07T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.5407
published_at 2026-04-09T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54117
published_at 2026-04-11T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54099
published_at 2026-04-12T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54082
published_at 2026-04-13T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.54121
published_at 2026-04-16T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.54125
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35596
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016098
reference_id 2016098
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016098
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35596
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syty-vyfp-yygc
97
url VCID-t6dn-wg6k-1ue6
vulnerability_id VCID-t6dn-wg6k-1ue6
summary mysql: Server: Compiling unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21367
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-02T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39603
published_at 2026-04-21T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39682
published_at 2026-04-12T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39666
published_at 2026-04-13T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39716
published_at 2026-04-16T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-18T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39722
published_at 2026-04-04T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.3964
published_at 2026-04-07T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39694
published_at 2026-04-08T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39709
published_at 2026-04-09T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39718
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21367
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043642
reference_id 2043642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043642
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:10Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
7
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
aliases CVE-2022-21367
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6dn-wg6k-1ue6
98
url VCID-t6rb-2f2t-h7g3
vulnerability_id VCID-t6rb-2f2t-h7g3
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2479
reference_id
reference_type
scores
0
value 0.00534
scoring_system epss
scoring_elements 0.67326
published_at 2026-04-01T12:55:00Z
1
value 0.00534
scoring_system epss
scoring_elements 0.67362
published_at 2026-04-02T12:55:00Z
2
value 0.00534
scoring_system epss
scoring_elements 0.67429
published_at 2026-04-21T12:55:00Z
3
value 0.00534
scoring_system epss
scoring_elements 0.67385
published_at 2026-04-04T12:55:00Z
4
value 0.00534
scoring_system epss
scoring_elements 0.67363
published_at 2026-04-07T12:55:00Z
5
value 0.00534
scoring_system epss
scoring_elements 0.67415
published_at 2026-04-08T12:55:00Z
6
value 0.00534
scoring_system epss
scoring_elements 0.67428
published_at 2026-04-09T12:55:00Z
7
value 0.00534
scoring_system epss
scoring_elements 0.67449
published_at 2026-04-11T12:55:00Z
8
value 0.00534
scoring_system epss
scoring_elements 0.67437
published_at 2026-04-12T12:55:00Z
9
value 0.00534
scoring_system epss
scoring_elements 0.67403
published_at 2026-04-13T12:55:00Z
10
value 0.00534
scoring_system epss
scoring_elements 0.67439
published_at 2026-04-16T12:55:00Z
11
value 0.00534
scoring_system epss
scoring_elements 0.67451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2479
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016090
reference_id 2016090
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016090
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-2479
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6rb-2f2t-h7g3
99
url VCID-tatx-17xb-1qe1
vulnerability_id VCID-tatx-17xb-1qe1
summary mysql: Server: DML unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35607
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52745
published_at 2026-04-01T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52768
published_at 2026-04-02T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.52853
published_at 2026-04-21T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52795
published_at 2026-04-04T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52762
published_at 2026-04-07T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52813
published_at 2026-04-08T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52807
published_at 2026-04-09T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52858
published_at 2026-04-11T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52841
published_at 2026-04-12T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.52825
published_at 2026-04-13T12:55:00Z
10
value 0.00295
scoring_system epss
scoring_elements 0.52862
published_at 2026-04-16T12:55:00Z
11
value 0.00295
scoring_system epss
scoring_elements 0.52869
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35607
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016104
reference_id 2016104
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016104
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
4
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
6
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35607
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tatx-17xb-1qe1
100
url VCID-tawp-6a7d-fycz
vulnerability_id VCID-tawp-6a7d-fycz
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21451
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46276
published_at 2026-04-02T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46299
published_at 2026-04-21T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46293
published_at 2026-04-12T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46302
published_at 2026-04-13T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46359
published_at 2026-04-16T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46355
published_at 2026-04-18T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46295
published_at 2026-04-04T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46242
published_at 2026-04-07T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46297
published_at 2026-04-09T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.46321
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21451
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082651
reference_id 2082651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082651
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:09Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
5
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
6
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
7
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
8
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
9
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
10
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
11
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
12
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
13
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
14
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
aliases CVE-2022-21451
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tawp-6a7d-fycz
101
url VCID-tupa-3adt-33hf
vulnerability_id VCID-tupa-3adt-33hf
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21539
reference_id
reference_type
scores
0
value 0.00396
scoring_system epss
scoring_elements 0.60452
published_at 2026-04-21T12:55:00Z
1
value 0.00458
scoring_system epss
scoring_elements 0.63975
published_at 2026-04-02T12:55:00Z
2
value 0.00458
scoring_system epss
scoring_elements 0.64028
published_at 2026-04-12T12:55:00Z
3
value 0.00458
scoring_system epss
scoring_elements 0.63999
published_at 2026-04-13T12:55:00Z
4
value 0.00458
scoring_system epss
scoring_elements 0.64034
published_at 2026-04-16T12:55:00Z
5
value 0.00458
scoring_system epss
scoring_elements 0.64046
published_at 2026-04-18T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.64003
published_at 2026-04-04T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.63963
published_at 2026-04-07T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.64013
published_at 2026-04-08T12:55:00Z
9
value 0.00458
scoring_system epss
scoring_elements 0.6403
published_at 2026-04-09T12:55:00Z
10
value 0.00458
scoring_system epss
scoring_elements 0.64042
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21539
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115297
reference_id 2115297
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115297
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
fixed_packages
aliases CVE-2022-21539
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tupa-3adt-33hf
102
url VCID-twrq-tvwe-xkd1
vulnerability_id VCID-twrq-tvwe-xkd1
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35626
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35626
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016112
reference_id 2016112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016112
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:23Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35626
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twrq-tvwe-xkd1
103
url VCID-txsg-dega-4fcs
vulnerability_id VCID-txsg-dega-4fcs
summary mysql: Server: Replication unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21415
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45297
published_at 2026-04-02T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45302
published_at 2026-04-21T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45305
published_at 2026-04-12T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45307
published_at 2026-04-13T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45358
published_at 2026-04-16T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45353
published_at 2026-04-18T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45319
published_at 2026-04-04T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45261
published_at 2026-04-07T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45317
published_at 2026-04-08T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45316
published_at 2026-04-09T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.45337
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21415
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082639
reference_id 2082639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082639
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:38Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21415
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-txsg-dega-4fcs
104
url VCID-u26p-pxhd-6fhm
vulnerability_id VCID-u26p-pxhd-6fhm
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21538
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50225
published_at 2026-04-21T12:55:00Z
1
value 0.00353
scoring_system epss
scoring_elements 0.57632
published_at 2026-04-02T12:55:00Z
2
value 0.00353
scoring_system epss
scoring_elements 0.57681
published_at 2026-04-12T12:55:00Z
3
value 0.00353
scoring_system epss
scoring_elements 0.57661
published_at 2026-04-13T12:55:00Z
4
value 0.00353
scoring_system epss
scoring_elements 0.5769
published_at 2026-04-16T12:55:00Z
5
value 0.00353
scoring_system epss
scoring_elements 0.57686
published_at 2026-04-18T12:55:00Z
6
value 0.00353
scoring_system epss
scoring_elements 0.57654
published_at 2026-04-04T12:55:00Z
7
value 0.00353
scoring_system epss
scoring_elements 0.57629
published_at 2026-04-07T12:55:00Z
8
value 0.00353
scoring_system epss
scoring_elements 0.57684
published_at 2026-04-08T12:55:00Z
9
value 0.00353
scoring_system epss
scoring_elements 0.57687
published_at 2026-04-09T12:55:00Z
10
value 0.00353
scoring_system epss
scoring_elements 0.57702
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21538
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115296
reference_id 2115296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115296
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
fixed_packages
aliases CVE-2022-21538
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u26p-pxhd-6fhm
105
url VCID-u8m3-6w1s-gyca
vulnerability_id VCID-u8m3-6w1s-gyca
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35647
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35647
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016137
reference_id 2016137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016137
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:02Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35647
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u8m3-6w1s-gyca
106
url VCID-uh48-944q-zbdx
vulnerability_id VCID-uh48-944q-zbdx
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21348
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21348
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043637
reference_id 2043637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043637
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:21Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21348
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uh48-944q-zbdx
107
url VCID-ujcd-zae5-fkc3
vulnerability_id VCID-ujcd-zae5-fkc3
summary mysql: Server: Options unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21515
reference_id
reference_type
scores
0
value 0.0035
scoring_system epss
scoring_elements 0.57503
published_at 2026-04-21T12:55:00Z
1
value 0.00748
scoring_system epss
scoring_elements 0.73053
published_at 2026-04-02T12:55:00Z
2
value 0.00748
scoring_system epss
scoring_elements 0.73048
published_at 2026-04-07T12:55:00Z
3
value 0.00748
scoring_system epss
scoring_elements 0.73085
published_at 2026-04-08T12:55:00Z
4
value 0.00748
scoring_system epss
scoring_elements 0.73098
published_at 2026-04-09T12:55:00Z
5
value 0.00748
scoring_system epss
scoring_elements 0.73122
published_at 2026-04-11T12:55:00Z
6
value 0.00748
scoring_system epss
scoring_elements 0.73102
published_at 2026-04-12T12:55:00Z
7
value 0.00748
scoring_system epss
scoring_elements 0.73096
published_at 2026-04-13T12:55:00Z
8
value 0.00748
scoring_system epss
scoring_elements 0.73139
published_at 2026-04-16T12:55:00Z
9
value 0.00748
scoring_system epss
scoring_elements 0.73148
published_at 2026-04-18T12:55:00Z
10
value 0.00748
scoring_system epss
scoring_elements 0.73074
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21515
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115284
reference_id 2115284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115284
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
reference_id 3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
9
reference_url https://usn.ubuntu.com/5537-2/
reference_id USN-5537-2
reference_type
scores
url https://usn.ubuntu.com/5537-2/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21515
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujcd-zae5-fkc3
108
url VCID-ukyc-ycpk-6ff1
vulnerability_id VCID-ukyc-ycpk-6ff1
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21253
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58191
published_at 2026-04-02T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58227
published_at 2026-04-21T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58183
published_at 2026-04-07T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58238
published_at 2026-04-08T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58243
published_at 2026-04-09T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.5826
published_at 2026-04-11T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58237
published_at 2026-04-12T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.58218
published_at 2026-04-13T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58249
published_at 2026-04-16T12:55:00Z
9
value 0.00361
scoring_system epss
scoring_elements 0.58252
published_at 2026-04-18T12:55:00Z
10
value 0.00361
scoring_system epss
scoring_elements 0.58211
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21253
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043622
reference_id 2043622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043622
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21253
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukyc-ycpk-6ff1
109
url VCID-umkj-5zap-zkgk
vulnerability_id VCID-umkj-5zap-zkgk
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21509
reference_id
reference_type
scores
0
value 0.0022
scoring_system epss
scoring_elements 0.44652
published_at 2026-04-02T12:55:00Z
1
value 0.0022
scoring_system epss
scoring_elements 0.44673
published_at 2026-04-04T12:55:00Z
2
value 0.0022
scoring_system epss
scoring_elements 0.4461
published_at 2026-04-07T12:55:00Z
3
value 0.0022
scoring_system epss
scoring_elements 0.44661
published_at 2026-04-08T12:55:00Z
4
value 0.0022
scoring_system epss
scoring_elements 0.44664
published_at 2026-04-09T12:55:00Z
5
value 0.0022
scoring_system epss
scoring_elements 0.4468
published_at 2026-04-11T12:55:00Z
6
value 0.0022
scoring_system epss
scoring_elements 0.4465
published_at 2026-04-13T12:55:00Z
7
value 0.0022
scoring_system epss
scoring_elements 0.44707
published_at 2026-04-16T12:55:00Z
8
value 0.0022
scoring_system epss
scoring_elements 0.44699
published_at 2026-04-18T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49179
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21509
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115283
reference_id 2115283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115283
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21509
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umkj-5zap-zkgk
110
url VCID-vyqe-sag1-c3gm
vulnerability_id VCID-vyqe-sag1-c3gm
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21641
reference_id
reference_type
scores
0
value 0.00457
scoring_system epss
scoring_elements 0.63895
published_at 2026-04-02T12:55:00Z
1
value 0.00457
scoring_system epss
scoring_elements 0.63958
published_at 2026-04-18T12:55:00Z
2
value 0.00457
scoring_system epss
scoring_elements 0.6396
published_at 2026-04-11T12:55:00Z
3
value 0.00457
scoring_system epss
scoring_elements 0.63946
published_at 2026-04-12T12:55:00Z
4
value 0.00457
scoring_system epss
scoring_elements 0.63913
published_at 2026-04-13T12:55:00Z
5
value 0.00457
scoring_system epss
scoring_elements 0.63948
published_at 2026-04-21T12:55:00Z
6
value 0.00457
scoring_system epss
scoring_elements 0.63922
published_at 2026-04-04T12:55:00Z
7
value 0.00457
scoring_system epss
scoring_elements 0.63879
published_at 2026-04-07T12:55:00Z
8
value 0.00457
scoring_system epss
scoring_elements 0.6393
published_at 2026-04-08T12:55:00Z
9
value 0.00457
scoring_system epss
scoring_elements 0.63947
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21641
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142878
reference_id 2142878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142878
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:40Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21641
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vyqe-sag1-c3gm
111
url VCID-w1m7-xnmp-cyet
vulnerability_id VCID-w1m7-xnmp-cyet
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21459
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51025
published_at 2026-04-02T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51087
published_at 2026-04-21T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51104
published_at 2026-04-16T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.51083
published_at 2026-04-12T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51066
published_at 2026-04-13T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.5111
published_at 2026-04-18T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.5105
published_at 2026-04-04T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.51007
published_at 2026-04-07T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51064
published_at 2026-04-08T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.5106
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21459
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082655
reference_id 2082655
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082655
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:01Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21459
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w1m7-xnmp-cyet
112
url VCID-wkz5-36y5-k7f7
vulnerability_id VCID-wkz5-36y5-k7f7
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21358
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.51057
published_at 2026-04-02T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51119
published_at 2026-04-21T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51114
published_at 2026-04-12T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.51098
published_at 2026-04-13T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51136
published_at 2026-04-16T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51142
published_at 2026-04-18T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51082
published_at 2026-04-04T12:55:00Z
7
value 0.00277
scoring_system epss
scoring_elements 0.51038
published_at 2026-04-07T12:55:00Z
8
value 0.00277
scoring_system epss
scoring_elements 0.51095
published_at 2026-04-08T12:55:00Z
9
value 0.00277
scoring_system epss
scoring_elements 0.51091
published_at 2026-04-09T12:55:00Z
10
value 0.00277
scoring_system epss
scoring_elements 0.51135
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21358
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043640
reference_id 2043640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043640
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:14Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21358
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wkz5-36y5-k7f7
113
url VCID-wm2n-ww3b-qkfp
vulnerability_id VCID-wm2n-ww3b-qkfp
summary mysql: Server: Replication unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21344
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-02T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39603
published_at 2026-04-21T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39682
published_at 2026-04-12T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39666
published_at 2026-04-13T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39716
published_at 2026-04-16T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39687
published_at 2026-04-18T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39722
published_at 2026-04-04T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.3964
published_at 2026-04-07T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39694
published_at 2026-04-08T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39709
published_at 2026-04-09T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39718
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21344
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043636
reference_id 2043636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043636
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:23Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
7
reference_url https://usn.ubuntu.com/5270-2/
reference_id USN-5270-2
reference_type
scores
url https://usn.ubuntu.com/5270-2/
fixed_packages
aliases CVE-2022-21344
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm2n-ww3b-qkfp
114
url VCID-wt5d-srfd-3qhc
vulnerability_id VCID-wt5d-srfd-3qhc
summary mysql: C API unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21595
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.34216
published_at 2026-04-02T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.34106
published_at 2026-04-21T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34183
published_at 2026-04-09T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34184
published_at 2026-04-11T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34141
published_at 2026-04-18T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34117
published_at 2026-04-13T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34154
published_at 2026-04-16T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34249
published_at 2026-04-04T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34112
published_at 2026-04-07T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34155
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21595
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142862
reference_id 2142862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142862
4
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:13Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
5
reference_url https://access.redhat.com/errata/RHSA-2022:5759
reference_id RHSA-2022:5759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5759
6
reference_url https://access.redhat.com/errata/RHSA-2022:5826
reference_id RHSA-2022:5826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5826
7
reference_url https://access.redhat.com/errata/RHSA-2022:5948
reference_id RHSA-2022:5948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5948
8
reference_url https://access.redhat.com/errata/RHSA-2022:6306
reference_id RHSA-2022:6306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6306
9
reference_url https://access.redhat.com/errata/RHSA-2022:6443
reference_id RHSA-2022:6443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6443
10
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
11
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
12
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
aliases CVE-2022-21595
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wt5d-srfd-3qhc
115
url VCID-wuuw-gec8-7fh2
vulnerability_id VCID-wuuw-gec8-7fh2
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21592
reference_id
reference_type
scores
0
value 0.00407
scoring_system epss
scoring_elements 0.61107
published_at 2026-04-02T12:55:00Z
1
value 0.00407
scoring_system epss
scoring_elements 0.61179
published_at 2026-04-21T12:55:00Z
2
value 0.00407
scoring_system epss
scoring_elements 0.61171
published_at 2026-04-12T12:55:00Z
3
value 0.00407
scoring_system epss
scoring_elements 0.61152
published_at 2026-04-13T12:55:00Z
4
value 0.00407
scoring_system epss
scoring_elements 0.61192
published_at 2026-04-16T12:55:00Z
5
value 0.00407
scoring_system epss
scoring_elements 0.61198
published_at 2026-04-18T12:55:00Z
6
value 0.00407
scoring_system epss
scoring_elements 0.61135
published_at 2026-04-04T12:55:00Z
7
value 0.00407
scoring_system epss
scoring_elements 0.61101
published_at 2026-04-07T12:55:00Z
8
value 0.00407
scoring_system epss
scoring_elements 0.61149
published_at 2026-04-08T12:55:00Z
9
value 0.00407
scoring_system epss
scoring_elements 0.61164
published_at 2026-04-09T12:55:00Z
10
value 0.00407
scoring_system epss
scoring_elements 0.61184
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21592
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142860
reference_id 2142860
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142860
3
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:16Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
8
reference_url https://usn.ubuntu.com/5696-2/
reference_id USN-5696-2
reference_type
scores
url https://usn.ubuntu.com/5696-2/
fixed_packages
aliases CVE-2022-21592
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wuuw-gec8-7fh2
116
url VCID-x1ya-zfn1-ebdd
vulnerability_id VCID-x1ya-zfn1-ebdd
summary mysql: Server: FTS unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35648
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.5474
published_at 2026-04-01T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54811
published_at 2026-04-02T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54844
published_at 2026-04-21T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54863
published_at 2026-04-18T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54845
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54822
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.5486
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-04T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54803
published_at 2026-04-07T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54854
published_at 2026-04-08T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.54851
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35648
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016138
reference_id 2016138
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016138
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:01Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35648
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ya-zfn1-ebdd
117
url VCID-x9ts-bdrn-ufha
vulnerability_id VCID-x9ts-bdrn-ufha
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21556
reference_id
reference_type
scores
0
value 0.00324
scoring_system epss
scoring_elements 0.55514
published_at 2026-04-21T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59415
published_at 2026-04-02T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59472
published_at 2026-04-12T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59453
published_at 2026-04-13T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59486
published_at 2026-04-16T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.59493
published_at 2026-04-18T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59439
published_at 2026-04-04T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59405
published_at 2026-04-07T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-08T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59469
published_at 2026-04-09T12:55:00Z
10
value 0.0038
scoring_system epss
scoring_elements 0.59488
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21556
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115300
reference_id 2115300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115300
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
fixed_packages
aliases CVE-2022-21556
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x9ts-bdrn-ufha
118
url VCID-y3ue-d94d-vygc
vulnerability_id VCID-y3ue-d94d-vygc
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21264
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59716
published_at 2026-04-02T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59789
published_at 2026-04-21T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.59741
published_at 2026-04-04T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.59711
published_at 2026-04-07T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59762
published_at 2026-04-13T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59776
published_at 2026-04-09T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.59796
published_at 2026-04-11T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.5978
published_at 2026-04-12T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59799
published_at 2026-04-16T12:55:00Z
9
value 0.00385
scoring_system epss
scoring_elements 0.59806
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21264
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043625
reference_id 2043625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043625
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21264
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3ue-d94d-vygc
119
url VCID-y6n1-n99c-yfcu
vulnerability_id VCID-y6n1-n99c-yfcu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21525
reference_id
reference_type
scores
0
value 0.00196
scoring_system epss
scoring_elements 0.41558
published_at 2026-04-02T12:55:00Z
1
value 0.00196
scoring_system epss
scoring_elements 0.41587
published_at 2026-04-04T12:55:00Z
2
value 0.00196
scoring_system epss
scoring_elements 0.41513
published_at 2026-04-07T12:55:00Z
3
value 0.00196
scoring_system epss
scoring_elements 0.41563
published_at 2026-04-08T12:55:00Z
4
value 0.00196
scoring_system epss
scoring_elements 0.41572
published_at 2026-04-09T12:55:00Z
5
value 0.00196
scoring_system epss
scoring_elements 0.41593
published_at 2026-04-11T12:55:00Z
6
value 0.00196
scoring_system epss
scoring_elements 0.4156
published_at 2026-04-12T12:55:00Z
7
value 0.00196
scoring_system epss
scoring_elements 0.41546
published_at 2026-04-13T12:55:00Z
8
value 0.00196
scoring_system epss
scoring_elements 0.41591
published_at 2026-04-16T12:55:00Z
9
value 0.00196
scoring_system epss
scoring_elements 0.41566
published_at 2026-04-18T12:55:00Z
10
value 0.00386
scoring_system epss
scoring_elements 0.59805
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21525
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
reference_id 1015789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115287
reference_id 2115287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115287
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
reference_id 3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
7
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
8
reference_url https://usn.ubuntu.com/5537-1/
reference_id USN-5537-1
reference_type
scores
url https://usn.ubuntu.com/5537-1/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
reference_id ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/
fixed_packages
aliases CVE-2022-21525
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y6n1-n99c-yfcu
120
url VCID-yn56-p3gf-13gf
vulnerability_id VCID-yn56-p3gf-13gf
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21437
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45297
published_at 2026-04-02T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45302
published_at 2026-04-21T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45305
published_at 2026-04-12T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.45307
published_at 2026-04-13T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45358
published_at 2026-04-16T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45353
published_at 2026-04-18T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45319
published_at 2026-04-04T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45261
published_at 2026-04-07T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45317
published_at 2026-04-08T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45316
published_at 2026-04-09T12:55:00Z
10
value 0.00225
scoring_system epss
scoring_elements 0.45337
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21437
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082647
reference_id 2082647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082647
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:19Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
fixed_packages
aliases CVE-2022-21437
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yn56-p3gf-13gf
121
url VCID-yvvh-5fmy-hkau
vulnerability_id VCID-yvvh-5fmy-hkau
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35625
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29549
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29616
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29437
published_at 2026-04-21T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29544
published_at 2026-04-12T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29491
published_at 2026-04-13T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.2951
published_at 2026-04-16T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29483
published_at 2026-04-18T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29665
published_at 2026-04-04T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29486
published_at 2026-04-07T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29587
published_at 2026-04-09T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29589
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35625
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016111
reference_id 2016111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016111
3
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:24Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
fixed_packages
aliases CVE-2021-35625
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvvh-5fmy-hkau
122
url VCID-zcn4-h4j5-qfat
vulnerability_id VCID-zcn4-h4j5-qfat
summary mysql: Server: DDL unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21249
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35984
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35837
published_at 2026-04-21T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35844
published_at 2026-04-07T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35894
published_at 2026-04-08T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35917
published_at 2026-04-09T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35922
published_at 2026-04-11T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-12T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35858
published_at 2026-04-13T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35898
published_at 2026-04-16T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35885
published_at 2026-04-18T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.36013
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21249
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043621
reference_id 2043621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043621
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21249
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcn4-h4j5-qfat
123
url VCID-ze42-san9-aqdg
vulnerability_id VCID-ze42-san9-aqdg
summary mysql: Server: DML unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21301
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-02T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51346
published_at 2026-04-21T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51256
published_at 2026-04-07T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51311
published_at 2026-04-08T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51308
published_at 2026-04-09T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51351
published_at 2026-04-11T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51331
published_at 2026-04-12T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-13T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51359
published_at 2026-04-16T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51366
published_at 2026-04-18T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21301
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043630
reference_id 2043630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043630
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
reference_id D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
4
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
5
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
6
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
reference_id U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
8
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21301
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ze42-san9-aqdg
124
url VCID-zxdt-rp17-ebbu
vulnerability_id VCID-zxdt-rp17-ebbu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21378
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48164
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-21T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-12T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-13T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-16T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48238
published_at 2026-04-18T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48185
published_at 2026-04-04T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48135
published_at 2026-04-07T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-08T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48183
published_at 2026-04-09T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.48207
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21378
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043647
reference_id 2043647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043647
3
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:01Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
4
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
5
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
6
reference_url https://usn.ubuntu.com/5270-1/
reference_id USN-5270-1
reference_type
scores
url https://usn.ubuntu.com/5270-1/
fixed_packages
aliases CVE-2022-21378
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxdt-rp17-ebbu
Fixing_vulnerabilities
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql80-mysql@8.0.30-1%3Farch=el7