Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-mariadb105-mariadb@3:10.5.13-1?arch=el7
Typerpm
Namespaceredhat
Namerh-mariadb105-mariadb
Version3:10.5.13-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-36fa-z98h-3yfk
vulnerability_id VCID-36fa-z98h-3yfk
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35604
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.42962
published_at 2026-04-01T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43022
published_at 2026-04-13T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.42858
published_at 2026-04-29T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43049
published_at 2026-04-09T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.42986
published_at 2026-04-07T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43036
published_at 2026-04-08T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43071
published_at 2026-04-11T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43037
published_at 2026-04-12T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.4308
published_at 2026-04-16T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43068
published_at 2026-04-18T12:55:00Z
10
value 0.00207
scoring_system epss
scoring_elements 0.43004
published_at 2026-04-21T12:55:00Z
11
value 0.00207
scoring_system epss
scoring_elements 0.42938
published_at 2026-04-24T12:55:00Z
12
value 0.00207
scoring_system epss
scoring_elements 0.42939
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016101
reference_id 2016101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016101
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
reference_id 5MLAXYFLUDC636S46X34USCLDZAOFBM2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
7
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
reference_id PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
9
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
10
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
11
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
12
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
13
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
14
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
15
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
17
reference_url https://usn.ubuntu.com/5123-1/
reference_id USN-5123-1
reference_type
scores
url https://usn.ubuntu.com/5123-1/
18
reference_url https://usn.ubuntu.com/5123-2/
reference_id USN-5123-2
reference_type
scores
url https://usn.ubuntu.com/5123-2/
19
reference_url https://usn.ubuntu.com/5170-1/
reference_id USN-5170-1
reference_type
scores
url https://usn.ubuntu.com/5170-1/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
reference_id XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
fixed_packages
aliases CVE-2021-35604
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk
1
url VCID-4buk-e1hz-67gv
vulnerability_id VCID-4buk-e1hz-67gv
summary mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46657.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46657
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20903
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21053
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21107
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20823
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20902
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20963
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.2098
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20936
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20882
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20873
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20874
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20854
published_at 2026-04-21T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20727
published_at 2026-04-24T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20722
published_at 2026-04-26T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.20688
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46657
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46657
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2049305
reference_id 2049305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2049305
5
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
6
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
7
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
8
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
9
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
aliases CVE-2021-46657
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4buk-e1hz-67gv
2
url VCID-844r-9np7-k7c8
vulnerability_id VCID-844r-9np7-k7c8
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46666.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46666
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19564
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19705
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19754
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19479
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19558
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.1961
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19614
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19566
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19508
published_at 2026-04-13T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19474
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19482
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19494
published_at 2026-04-21T12:55:00Z
12
value 0.00063
scoring_system epss
scoring_elements 0.19385
published_at 2026-04-24T12:55:00Z
13
value 0.00063
scoring_system epss
scoring_elements 0.19376
published_at 2026-04-26T12:55:00Z
14
value 0.00063
scoring_system epss
scoring_elements 0.19337
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46666
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46666
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050028
reference_id 2050028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050028
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
aliases CVE-2021-46666
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-844r-9np7-k7c8
3
url VCID-eakf-rhk4-m3g8
vulnerability_id VCID-eakf-rhk4-m3g8
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2154.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2154
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-21T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22765
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22662
published_at 2026-04-18T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22666
published_at 2026-04-16T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.2265
published_at 2026-04-13T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22707
published_at 2026-04-12T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22746
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22726
published_at 2026-04-09T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22675
published_at 2026-04-08T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-04T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-07T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.247
published_at 2026-04-29T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24756
published_at 2026-04-24T12:55:00Z
14
value 0.00086
scoring_system epss
scoring_elements 0.24745
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2154
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2154
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951752
reference_id 1951752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951752
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
reference_id 988428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
6
reference_url https://security.archlinux.org/ASA-202105-14
reference_id ASA-202105-14
reference_type
scores
url https://security.archlinux.org/ASA-202105-14
7
reference_url https://security.archlinux.org/AVG-1882
reference_id AVG-1882
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1882
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
reference_id DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
reference_id GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
10
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://security.gentoo.org/glsa/202105-27
11
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://security.gentoo.org/glsa/202105-28
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
reference_id PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
13
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
14
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
15
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
16
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
17
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
18
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
19
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
20
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
aliases CVE-2021-2154
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eakf-rhk4-m3g8
4
url VCID-g2x8-3226-jufz
vulnerability_id VCID-g2x8-3226-jufz
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31624
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13585
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13646
published_at 2026-04-04T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13445
published_at 2026-04-21T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13526
published_at 2026-04-08T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13576
published_at 2026-04-09T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13548
published_at 2026-04-11T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.1351
published_at 2026-04-12T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13463
published_at 2026-04-13T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13376
published_at 2026-04-16T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13374
published_at 2026-04-18T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13449
published_at 2026-04-24T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.1342
published_at 2026-04-26T12:55:00Z
12
value 0.00044
scoring_system epss
scoring_elements 0.13316
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31624
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092362
reference_id 2092362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092362
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
aliases CVE-2022-31624
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2x8-3226-jufz
5
url VCID-j734-hefa-1yaa
vulnerability_id VCID-j734-hefa-1yaa
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2372
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49828
published_at 2026-04-01T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.4985
published_at 2026-04-29T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49865
published_at 2026-04-02T12:55:00Z
3
value 0.00264
scoring_system epss
scoring_elements 0.49893
published_at 2026-04-04T12:55:00Z
4
value 0.00264
scoring_system epss
scoring_elements 0.49844
published_at 2026-04-07T12:55:00Z
5
value 0.00264
scoring_system epss
scoring_elements 0.49898
published_at 2026-04-08T12:55:00Z
6
value 0.00264
scoring_system epss
scoring_elements 0.49892
published_at 2026-04-09T12:55:00Z
7
value 0.00264
scoring_system epss
scoring_elements 0.4991
published_at 2026-04-11T12:55:00Z
8
value 0.00264
scoring_system epss
scoring_elements 0.49882
published_at 2026-04-12T12:55:00Z
9
value 0.00264
scoring_system epss
scoring_elements 0.49883
published_at 2026-04-13T12:55:00Z
10
value 0.00264
scoring_system epss
scoring_elements 0.49928
published_at 2026-04-16T12:55:00Z
11
value 0.00264
scoring_system epss
scoring_elements 0.49929
published_at 2026-04-18T12:55:00Z
12
value 0.00264
scoring_system epss
scoring_elements 0.49901
published_at 2026-04-21T12:55:00Z
13
value 0.00264
scoring_system epss
scoring_elements 0.49888
published_at 2026-04-24T12:55:00Z
14
value 0.00264
scoring_system epss
scoring_elements 0.49895
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2372
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992303
reference_id 1992303
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992303
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
reference_id 6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
7
reference_url https://security.archlinux.org/AVG-2226
reference_id AVG-2226
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2226
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
reference_id OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
9
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
10
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
11
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
12
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
13
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
14
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
15
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
17
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
18
reference_url https://usn.ubuntu.com/5022-2/
reference_id USN-5022-2
reference_type
scores
url https://usn.ubuntu.com/5022-2/
19
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
fixed_packages
aliases CVE-2021-2372
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j734-hefa-1yaa
6
url VCID-pk23-a5y3-4ub5
vulnerability_id VCID-pk23-a5y3-4ub5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31621
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09534
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09597
published_at 2026-04-29T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09497
published_at 2026-04-07T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09572
published_at 2026-04-08T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09619
published_at 2026-04-09T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09626
published_at 2026-04-11T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09596
published_at 2026-04-12T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.0958
published_at 2026-04-13T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09473
published_at 2026-04-16T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09477
published_at 2026-04-18T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09625
published_at 2026-04-21T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09672
published_at 2026-04-24T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.09639
published_at 2026-04-26T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09584
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31621
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31621
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092353
reference_id 2092353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092353
5
reference_url https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
reference_id b1351c15946349f9daa7e5297fb2ac6f3139e4a8
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
6
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
7
reference_url https://jira.mariadb.org/browse/MDEV-26561
reference_id MDEV-26561
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://jira.mariadb.org/browse/MDEV-26561
8
reference_url https://jira.mariadb.org/browse/MDEV-26574
reference_id MDEV-26574
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://jira.mariadb.org/browse/MDEV-26574
9
reference_url https://jira.mariadb.org/browse/MDEV-26574?filter=-2
reference_id MDEV-26574?filter=-2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://jira.mariadb.org/browse/MDEV-26574?filter=-2
10
reference_url https://security.netapp.com/advisory/ntap-20220707-0006/
reference_id ntap-20220707-0006
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-03T15:23:58Z/
url https://security.netapp.com/advisory/ntap-20220707-0006/
11
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
12
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
13
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
14
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
15
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
16
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
aliases CVE-2022-31621
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pk23-a5y3-4ub5
7
url VCID-qv7j-a4nn-97f7
vulnerability_id VCID-qv7j-a4nn-97f7
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2021)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2389
reference_id
reference_type
scores
0
value 0.00552
scoring_system epss
scoring_elements 0.67956
published_at 2026-04-01T12:55:00Z
1
value 0.00552
scoring_system epss
scoring_elements 0.68107
published_at 2026-04-29T12:55:00Z
2
value 0.00552
scoring_system epss
scoring_elements 0.67998
published_at 2026-04-04T12:55:00Z
3
value 0.00552
scoring_system epss
scoring_elements 0.67977
published_at 2026-04-07T12:55:00Z
4
value 0.00552
scoring_system epss
scoring_elements 0.68028
published_at 2026-04-08T12:55:00Z
5
value 0.00552
scoring_system epss
scoring_elements 0.68042
published_at 2026-04-09T12:55:00Z
6
value 0.00552
scoring_system epss
scoring_elements 0.68066
published_at 2026-04-11T12:55:00Z
7
value 0.00552
scoring_system epss
scoring_elements 0.68052
published_at 2026-04-12T12:55:00Z
8
value 0.00552
scoring_system epss
scoring_elements 0.68017
published_at 2026-04-13T12:55:00Z
9
value 0.00552
scoring_system epss
scoring_elements 0.68054
published_at 2026-04-16T12:55:00Z
10
value 0.00552
scoring_system epss
scoring_elements 0.68067
published_at 2026-04-18T12:55:00Z
11
value 0.00552
scoring_system epss
scoring_elements 0.6805
published_at 2026-04-21T12:55:00Z
12
value 0.00552
scoring_system epss
scoring_elements 0.68093
published_at 2026-04-24T12:55:00Z
13
value 0.00552
scoring_system epss
scoring_elements 0.68101
published_at 2026-04-26T12:55:00Z
14
value 0.00552
scoring_system epss
scoring_elements 0.67979
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2389
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1992309
reference_id 1992309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1992309
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
reference_id 2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
6
reference_url https://security.archlinux.org/AVG-2226
reference_id AVG-2226
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2226
7
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
8
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
9
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
10
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
11
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
12
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
13
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
14
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
15
reference_url https://usn.ubuntu.com/5022-1/
reference_id USN-5022-1
reference_type
scores
url https://usn.ubuntu.com/5022-1/
16
reference_url https://usn.ubuntu.com/5022-2/
reference_id USN-5022-2
reference_type
scores
url https://usn.ubuntu.com/5022-2/
17
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
reference_id VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
19
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-880/
reference_id ZDI-21-880
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-880/
fixed_packages
aliases CVE-2021-2389
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7j-a4nn-97f7
8
url VCID-tawp-6a7d-fycz
vulnerability_id VCID-tawp-6a7d-fycz
summary mysql: InnoDB unspecified vulnerability (CPU Apr 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21451
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46276
published_at 2026-04-02T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46238
published_at 2026-04-29T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46355
published_at 2026-04-18T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46299
published_at 2026-04-21T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46281
published_at 2026-04-24T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46292
published_at 2026-04-26T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46295
published_at 2026-04-04T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46242
published_at 2026-04-07T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46297
published_at 2026-04-09T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.46321
published_at 2026-04-11T12:55:00Z
10
value 0.00234
scoring_system epss
scoring_elements 0.46293
published_at 2026-04-12T12:55:00Z
11
value 0.00234
scoring_system epss
scoring_elements 0.46302
published_at 2026-04-13T12:55:00Z
12
value 0.00234
scoring_system epss
scoring_elements 0.46359
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21451
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082651
reference_id 2082651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082651
3
reference_url https://security.netapp.com/advisory/ntap-20220429-0005/
reference_id ntap-20220429-0005
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:09Z/
url https://security.netapp.com/advisory/ntap-20220429-0005/
4
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
5
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
6
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
7
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
8
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
9
reference_url https://access.redhat.com/errata/RHSA-2022:6518
reference_id RHSA-2022:6518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6518
10
reference_url https://access.redhat.com/errata/RHSA-2022:6590
reference_id RHSA-2022:6590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6590
11
reference_url https://access.redhat.com/errata/RHSA-2022:7119
reference_id RHSA-2022:7119
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7119
12
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
13
reference_url https://usn.ubuntu.com/5400-1/
reference_id USN-5400-1
reference_type
scores
url https://usn.ubuntu.com/5400-1/
14
reference_url https://usn.ubuntu.com/5400-2/
reference_id USN-5400-2
reference_type
scores
url https://usn.ubuntu.com/5400-2/
fixed_packages
aliases CVE-2022-21451
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tawp-6a7d-fycz
9
url VCID-wvxn-ugew-u7bj
vulnerability_id VCID-wvxn-ugew-u7bj
summary
Multiple vulnerabilities have been found in MySQL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2166
reference_id
reference_type
scores
0
value 0.01154
scoring_system epss
scoring_elements 0.78469
published_at 2026-04-01T12:55:00Z
1
value 0.01154
scoring_system epss
scoring_elements 0.78602
published_at 2026-04-29T12:55:00Z
2
value 0.01154
scoring_system epss
scoring_elements 0.78475
published_at 2026-04-02T12:55:00Z
3
value 0.01154
scoring_system epss
scoring_elements 0.78506
published_at 2026-04-04T12:55:00Z
4
value 0.01154
scoring_system epss
scoring_elements 0.78489
published_at 2026-04-07T12:55:00Z
5
value 0.01154
scoring_system epss
scoring_elements 0.78516
published_at 2026-04-08T12:55:00Z
6
value 0.01154
scoring_system epss
scoring_elements 0.78522
published_at 2026-04-09T12:55:00Z
7
value 0.01154
scoring_system epss
scoring_elements 0.78547
published_at 2026-04-11T12:55:00Z
8
value 0.01154
scoring_system epss
scoring_elements 0.78529
published_at 2026-04-12T12:55:00Z
9
value 0.01154
scoring_system epss
scoring_elements 0.78521
published_at 2026-04-13T12:55:00Z
10
value 0.01154
scoring_system epss
scoring_elements 0.78549
published_at 2026-04-16T12:55:00Z
11
value 0.01154
scoring_system epss
scoring_elements 0.78548
published_at 2026-04-18T12:55:00Z
12
value 0.01154
scoring_system epss
scoring_elements 0.78545
published_at 2026-04-21T12:55:00Z
13
value 0.01154
scoring_system epss
scoring_elements 0.78578
published_at 2026-04-24T12:55:00Z
14
value 0.01154
scoring_system epss
scoring_elements 0.78585
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951755
reference_id 1951755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951755
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
reference_id 987325
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
reference_id 988428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
reference_id AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/
8
reference_url https://security.archlinux.org/ASA-202105-14
reference_id ASA-202105-14
reference_type
scores
url https://security.archlinux.org/ASA-202105-14
9
reference_url https://security.archlinux.org/AVG-1882
reference_id AVG-1882
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1882
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
reference_id DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
reference_id GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/
12
reference_url https://security.gentoo.org/glsa/202105-27
reference_id GLSA-202105-27
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://security.gentoo.org/glsa/202105-27
13
reference_url https://security.gentoo.org/glsa/202105-28
reference_id GLSA-202105-28
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://security.gentoo.org/glsa/202105-28
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
reference_id JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
reference_id PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/
16
reference_url https://access.redhat.com/errata/RHSA-2021:3590
reference_id RHSA-2021:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3590
17
reference_url https://access.redhat.com/errata/RHSA-2021:3811
reference_id RHSA-2021:3811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3811
18
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
19
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
20
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
21
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
22
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
23
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
reference_id UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/
25
reference_url https://usn.ubuntu.com/4952-1/
reference_id USN-4952-1
reference_type
scores
url https://usn.ubuntu.com/4952-1/
26
reference_url https://usn.ubuntu.com/5022-3/
reference_id USN-5022-3
reference_type
scores
url https://usn.ubuntu.com/5022-3/
fixed_packages
aliases CVE-2021-2166
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj
10
url VCID-wyvr-ducu-ukfq
vulnerability_id VCID-wyvr-ducu-ukfq
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46667
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11553
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11679
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11722
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11507
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11594
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11653
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11664
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11627
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.116
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11463
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11465
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11591
published_at 2026-04-21T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11543
published_at 2026-04-24T12:55:00Z
13
value 0.00039
scoring_system epss
scoring_elements 0.11503
published_at 2026-04-26T12:55:00Z
14
value 0.00039
scoring_system epss
scoring_elements 0.11432
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46667
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46667
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050030
reference_id 2050030
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050030
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
aliases CVE-2021-46667
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyvr-ducu-ukfq
11
url VCID-y9qz-gnth-87dt
vulnerability_id VCID-y9qz-gnth-87dt
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46662
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20169
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20317
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20376
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20099
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.2018
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20239
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20262
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20217
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20158
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20151
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20154
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20153
published_at 2026-04-21T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.20034
published_at 2026-04-24T12:55:00Z
13
value 0.00065
scoring_system epss
scoring_elements 0.20029
published_at 2026-04-26T12:55:00Z
14
value 0.00065
scoring_system epss
scoring_elements 0.19998
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46662
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050019
reference_id 2050019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050019
4
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
5
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
6
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
7
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
8
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
9
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
aliases CVE-2021-46662
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9qz-gnth-87dt
12
url VCID-z7ed-2j49-kfh5
vulnerability_id VCID-z7ed-2j49-kfh5
summary Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27385
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36278
published_at 2026-04-29T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36395
published_at 2026-04-24T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36364
published_at 2026-04-26T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49733
published_at 2026-04-04T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49739
published_at 2026-04-08T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49734
published_at 2026-04-09T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49751
published_at 2026-04-11T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49723
published_at 2026-04-12T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49724
published_at 2026-04-13T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49771
published_at 2026-04-18T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49744
published_at 2026-04-21T12:55:00Z
11
value 0.00263
scoring_system epss
scoring_elements 0.49684
published_at 2026-04-07T12:55:00Z
12
value 0.00263
scoring_system epss
scoring_elements 0.49705
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27385
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27385
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2075001
reference_id 2075001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2075001
5
reference_url https://security.gentoo.org/glsa/202405-25
reference_id GLSA-202405-25
reference_type
scores
url https://security.gentoo.org/glsa/202405-25
6
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
7
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
8
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
9
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
10
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
11
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
aliases CVE-2022-27385
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7ed-2j49-kfh5
13
url VCID-zzhd-1eyg-muge
vulnerability_id VCID-zzhd-1eyg-muge
summary mariadb: save_window_function_values triggers an abort during IN subquery
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46658.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46658
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24198
published_at 2026-04-01T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24327
published_at 2026-04-02T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.2436
published_at 2026-04-04T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24144
published_at 2026-04-07T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.2421
published_at 2026-04-08T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24269
published_at 2026-04-11T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24226
published_at 2026-04-12T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24169
published_at 2026-04-13T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24185
published_at 2026-04-16T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24172
published_at 2026-04-18T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24149
published_at 2026-04-21T12:55:00Z
12
value 0.00083
scoring_system epss
scoring_elements 0.24025
published_at 2026-04-24T12:55:00Z
13
value 0.00083
scoring_system epss
scoring_elements 0.24014
published_at 2026-04-26T12:55:00Z
14
value 0.00083
scoring_system epss
scoring_elements 0.23974
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46658
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2049294
reference_id 2049294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2049294
5
reference_url https://access.redhat.com/errata/RHSA-2022:1007
reference_id RHSA-2022:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1007
6
reference_url https://access.redhat.com/errata/RHSA-2022:1010
reference_id RHSA-2022:1010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1010
7
reference_url https://access.redhat.com/errata/RHSA-2022:1556
reference_id RHSA-2022:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1556
8
reference_url https://access.redhat.com/errata/RHSA-2022:1557
reference_id RHSA-2022:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1557
9
reference_url https://access.redhat.com/errata/RHSA-2022:4818
reference_id RHSA-2022:4818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4818
10
reference_url https://access.redhat.com/errata/RHSA-2023:6821
reference_id RHSA-2023:6821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6821
fixed_packages
aliases CVE-2021-46658
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zzhd-1eyg-muge
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mariadb105-mariadb@3:10.5.13-1%3Farch=el7